CN105794170A - Hazard detection unit facilitating user-friendly setup experience - Google Patents

Hazard detection unit facilitating user-friendly setup experience Download PDF

Info

Publication number
CN105794170A
CN105794170A CN201480064784.2A CN201480064784A CN105794170A CN 105794170 A CN105794170 A CN 105794170A CN 201480064784 A CN201480064784 A CN 201480064784A CN 105794170 A CN105794170 A CN 105794170A
Authority
CN
China
Prior art keywords
hazard detector
user
network
detector
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201480064784.2A
Other languages
Chinese (zh)
Other versions
CN105794170B (en
Inventor
索菲·勒冈
戴维·斯卢
安东尼·M·法代尔
马修·L·罗杰斯
本庄茂史
杰伊·洛格
格兰特·埃里克森
尼克·韦伯
杰弗里·A·博伊德
詹姆斯·B·西米斯特尔
杰西·W·博埃特赫尔
蒂莫·A·布鲁克
凯文·科波克
夏奈·罗西
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Google LLC
Original Assignee
Google LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Google LLC filed Critical Google LLC
Publication of CN105794170A publication Critical patent/CN105794170A/en
Application granted granted Critical
Publication of CN105794170B publication Critical patent/CN105794170B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/003Address allocation methods and details
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/009Signalling of the alarm condition to a substation whose identity is signalled to a central station, e.g. relaying alarm signals in order to extend communication range
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B25/00Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
    • G08B25/01Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
    • G08B25/08Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using communication transmission lines
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B7/00Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00
    • G08B7/06Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources
    • G08B7/066Signalling systems according to more than one of groups G08B3/00 - G08B6/00; Personal calling systems according to more than one of groups G08B3/00 - G08B6/00 using electric transmission, e.g. involving audible and visible signalling through the use of sound and light sources guiding along a path, e.g. evacuation path lighting strip
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L12/2807Exchanging configuration information on appliance services in a home automation network
    • H04L12/2814Exchanging control software or macros for controlling appliance services in a home automation network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/18Network architectures or network communication protocols for network security using different networks or channels, e.g. using out of band channels
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/10Architectures or entities
    • H04L65/102Gateways
    • H04L65/1033Signalling gateways
    • H04L65/1036Signalling gateways at the edge
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1069Session establishment or de-establishment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/54Presence management, e.g. monitoring or registration for receipt of user log-on information, or the connection status of the users
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/30Services specially adapted for particular environments, situations or purposes
    • H04W4/38Services specially adapted for particular environments, situations or purposes for collecting sensor information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/2847Home automation networks characterised by the type of home appliance used
    • H04L2012/285Generic home appliances, e.g. refrigerators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Emergency Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Telephonic Communication Services (AREA)
  • Selective Calling Equipment (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Toxicology (AREA)
  • Alarm Systems (AREA)
  • Environmental & Geological Engineering (AREA)

Abstract

A method for establishing a pairing between a hazard detector and an online account may include instantiating an application on a mobile computing device and receiving a first code from a central server. The application may receive a second code from printed material associated with the hazard detector. The hazard detector may broadcast a Wi-Fi access point, and the application may join the Wi-Fi access point. The application can be authenticated by the hazard detector using the second code, and the application can receive an identity of a home Wi-Fi network from a user. The application can then transmit the identity of the home Wi-Fi network to the hazard detector. The hazard detector can use the home Wi-Fi network to access the Internet and transmit the first code to the central server, where the central server can use the first code in completing the pairing process.

Description

Promote the user-friendly hazard detection unit that experience is set
Cross-Reference to Related Applications
This application claims and submit (attorney docket 94021-868290 on October 7th, 2013 | NES0308-PROV) the interim Shen of the U.S. of entitled " User-Friendly Detection Unit " Please the priority of No.61/887,969.The application thus by quote merging for all mesh 's.
Background technology
Hazard detector uses sensors to detect that may be harmful in air or may indicate that danger The material of the development of dangerous situation shape.Such as, carbon monoxide (CO) and radon gas are to be exposed on height Material human and animal may being harmful in the case of under content.But, these materials are difficult to Feel to detect with the mankind, because they are colourless, scentless and tasteless.Dangerous inspection Survey device and can detect the existence of these materials and by reporting to the police to notify that user prevents exposure Ill-effect.In other cases, although the material of such as cigarette itself may not be harmful to, but energy Enough indicate the development of danger situation (such as fire).The early alert of the existence of such material It is prevented from danger situation development or makes the ill-effect of this situation minimize.The danger of interconnection Detector includes the detector being connected to network so that can realize between detector or with Communication between central control unit.This provides several advantages relative to individual detectors, including For activating the ability of multiple alarm when single detector is triggered.Can be according to by government Mechanism and/or the company (such as Underwriters Laboratory (UL)) by execution safety test are defined Standard prove that hazard detector is qualified.Such as, some UL standard definition smoke detector and When CO detector should send out the threshold value of alarm sound.Some UL standard also defines the required of warning Characteristic, the volume of such as power reguirements and alarm sound, pitch and pattern.
Summary of the invention
The embodiment provides the many sensings hazard detection unit for promoting intelligent networking Or the offer of intelligence hazard detector, the method and system that arranges, configure, control and/or manage. Can use in family, building or structure these intelligence hazard detector, with to family, The occupant of building or structure reports to the police potential threat.Can be so that what involved user makes great efforts Amount minimizing or the mode minimized realize intelligent hazard detector of these networkings and based on cloud Intelligent hazard detector management system on user account or " pairing " of online management account. Use first wireless protocols in these intelligence hazard detector comes and online management account After pairing, another intelligence hazard detector can use the second wireless protocols and match Intelligence hazard detector communicates, to receive for the instruction with the pairing of online management account. These intelligence hazard detector can perform various function, such as, generate and alarm (such as, danger Danger detection alarm, status information alarm and notice alarm) visual effect that is associated.These intelligence Hazard detector can also receive for communication and generate and intelligence hazard detector status information (such as, the intelligence Wi-Fi connection status of hazard detector or the battery status of hazard detector) The request of the designator being associated.
According to some embodiments, can present for set up wired home hazard detector with in The method of the pairing between the online management account set up at the server of centre.Online management account can To have related account.Described method can be included at mobile computing device and make pin Configuration and the application example of control design case to hazard detector.Application can pass through internet Set up with central server and communicate.Described method is additionally may included at mobile computing device therefrom Centre server receives first code.Described method can additionally include at mobile computing device Receive the printing surface from hazard detector or position is being set physically with dangerous inspection The document printing surveying device or the information being packaged to be.This information can include second code.Described Method can also include being accessed by the Wi-Fi hosted by hazard detector by hazard detector broadcast Point SSID.Described method is additionally may included at mobile computing device to receive from user and connects described Selecting and the Wi-Fi connection corresponding with hazard detector foundation of access point SSID.Can use Wi-Fi connection is authenticated by second code.Described method can additionally include mobile meter Calculate and receive hazard detector at device for accessing the identity of the home Wi-Fi network of internet.Institute The method of stating may further include from mobile computing device to hazard detector send first code with And the identity of described home Wi-Fi network.Described method can also include being used by hazard detector Home Wi-Fi network sets up data communication with central server.Described method can additionally be wrapped Include the transmission being included first code by hazard detector to central server transmission.Described transmission can To be used the memory being stored in described hazard detector the most regularly by central server In information be authenticated.Pairing can be achieved in that (i) by central server Described second code is used to verify the matching relationship pre-build;And (ii) is when checking, Described hazard detector is made to be associated with described account.
In various embodiments, it is also possible to realize in following aspect is one or more.Dangerous inspection Survey the printing surface on device or position is being set physically with the printing literary composition of hazard detector Offer or pack and can include quickly response (QR) code to second code encoding of graphs.Described Method be additionally may included at mobile computing device receive hazard detector in the enclosure will be mounted In the position arranging position;And sent by mobile computing device to store to central server Position at online management account.Selected position can include bedroom, bathroom, family Playroom, living room, child bedroom, master bedroom, guest bedroom or dining room.Second code The printing surface that can be printed in hazard detector with alphanumeric style or physically accompany With hazard detector document printing or packaging on.Described method can also include by hazard detection Device provides instruction user to be used for beginning setting up hazard detector and at spool to hazard detector offer The verbal order of user's input of the process of the pairing between reason account.Described method can be added Ground includes being provided instruction user to make the oral of application example in mobile device by hazard detector Order.This order can include the instruction for downloading application from application on site market.Described side Method is additionally may included at mobile computing device and receives configuration information from central server.This configuration Information can include so that hazard detector can set up or add the compatible this locality of 802.15.4 The information of plant network.Described method is additionally may included in the identity of home Wi-Fi network and is sent From mobile computing device, the identity of home Wi-Fi network is deleted after hazard detector.Described Method can also include that being sent use by hazard detector to central server during manufacture or makes The certification letter that the cryptographic key being stored in hazard detector during after making and/or certificate generate Breath.
According to some embodiments, can present for set up wired home hazard detector with in The system of the pairing between the online management account set up at the server of centre.Online management account can To have related account.This system can be included on mobile computing device operation Application.This application can be the configuration for hazard detector and control design case.Apply permissible Communicated with central server foundation by internet.Application may be configured to from central server Receive first code and receive the printing surface from hazard detector or position is being set Physically with the document printing of hazard detector or the information that is packaged to be.This information can be wrapped Include second code.Application can be configured to receive the access point broadcasted by hazard detector The selection of SSID.This selection can receive from user and set up corresponding with hazard detector Wi-Fi connects.Can use second code that Wi-Fi is connected to be authenticated.Application can be by It is additionally configured to receive hazard detector for accessing the body of the home Wi-Fi network of internet Part and send first code and the described identity of home Wi-Fi network to hazard detector.Should System can also include hazard detector.Hazard detector may be configured to receive for starting Match and broadcast user's input of Wi-Fi access point SSID.Hazard detector can also be joined It is set to be used second code that the connection to WiFi access point is authenticated by application and from answering With receiving first code and the identity of home Wi-Fi network.Hazard detector can additionally by It is configured to use home Wi-Fi network to set up data communication with central server, and to central authorities Server sends the transmission including first code.This transmission can be used in system by central server The information being stored in the memory of described hazard detector regularly when making is authenticated.Join To being achieved in that (i) uses second code to verify in advance by central server The matching relationship set up;And (ii) is when checking, makes hazard detector and account phase Association.
In various embodiments, it is also possible to realize in following aspect is one or more.Dangerous inspection Survey the printing surface on device or position is being set physically with the printing literary composition of hazard detector Offer or pack and can include quickly response (QR) code to second code encoding of graphs.Application Hazard detector in the enclosure can be further configured to receive and the position that position is set will be installed in Put;And send the position at online management account to be stored in central server.Selected Position can include bedroom, bathroom, home entertaining room, living room, child bedroom, owner Bedroom, guest bedroom or dining room.Second code can be printed on danger with alphanumeric style Printing surface or physically with document printing or the packaging of hazard detector on detector On.Hazard detector can be further configured to provide instruction user to provide to hazard detector Defeated for beginning setting up the user of the process of the pairing between hazard detector and online management account The verbal order entered.Hazard detector can be additionally configured to provide instruction user moving The verbal order of application example is made at device.This order can include for from application on site city Carry the instruction of application after the match.Application can be additionally configured to receive configuration from central server Information.This configuration information can include so that hazard detector can be set up or adds 802.15.4 The information of compatible local device network.Application can be configured at home Wi-Fi network Identity deletes the identity of home Wi-Fi network after being sent to hazard detector.Hazard detector Deposit during can be configured to after central server transmission uses during manufacture or manufactures The authentication information that storage cryptographic key in hazard detector and/or certificate generate.
In order to be more fully understood that character and the advantage of the present invention, it should with reference to the following description and drawings. It will be appreciated, however, that each in these figures is to provide merely for the purpose illustrated, And it is not intended as the definition of the restriction of the scope of the present invention.And, as general rule, and And unless obviously used this description of identical reference from the element in different figures on the contrary, no Then these elements are typically the most identical or at least similar in function or purpose.
Accompanying drawing explanation
Fig. 1 is the device described further herein according to embodiment, method, system, clothes One or more showing applicable Intelligence home environment in business and/or computer program Example.
Fig. 2 diagram according to embodiment can be integrated expansible with the Intelligence home environment of Fig. 1 Device and the network level view of service platform.
Fig. 3 diagram is according to the process engine of reference the Intelligence home environment of embodiment and device The expandable device of Fig. 2 and the abstraction function view of service platform.
Fig. 4 A-4B illustrates the hazard detector of the many sensings networking of the intelligence according to embodiment respectively Isometric exploded view and assembled view.
Before Fig. 5 A-5B diagram circuit board according to the hazard detector of Fig. 4 A-4B of embodiment Stereogram and rear stereogram.
Fig. 5 C-5D diagram is according to the electricity of the hazard detector that may be installed Fig. 9 A-9B of embodiment The front stereogram of the loudspeaker on the plate of road and rear stereogram.
Fig. 6 A-6B illustrates the lens button of the hazard detector of Fig. 4 A-4B according to embodiment Front stereogram and rear stereogram.
Fig. 6 C-6D diagram is according to vertical before the photoconduction of the hazard detector of Fig. 4 A-4B of embodiment Body figure and rear stereogram.
Before Fig. 6 E-6F diagram flexible-belt according to the hazard detector of Fig. 4 A-4B of embodiment Stereogram and rear stereogram.
Fig. 7 A-7D diagram according to some embodiments be used for provide and make the first hazard detector with The system flow chart of the user account pairing on Cloud Server.
Fig. 7 E diagram according to some embodiments set up hazard detector with at central server The flow chart of the method for the pairing between the online management account set up.
Fig. 7 F to Fig. 7 H-2 diagram being used for from server, user and dangerous inspection according to embodiment The viewpoint surveying device makes intelligence hazard detector and the method for online management account pairing.
Fig. 7 I diagram is according to the internuncial side of network for testing hazard detector of embodiment Method.
Fig. 8 A-8T illustrates the physical process being associated according to the method with Fig. 7 A-7C of embodiment Example.
Showing of the physical process that Fig. 8 U diagram is associated according to the method with Fig. 7 D of embodiment Example.
Fig. 9 diagram according to embodiment be used for make two or more hazard detector and at spool The method of reason account pairing.
Figure 10 diagram relating in the case of the second hazard detector is provided according to some embodiments Device in some.
It is every that Figure 11 is shown in the device providing and making the second hazard detector to relate to when matching The initial state of one.
Figure 12 A-12E diagram is run to start and the joining of the second hazard detector on the mobile device User interface to the application of process.
Figure 13 diagram is delivered to mobile computing device according to the access token of some embodiments Flow chart.
Figure 14 diagram is passed to move from the first hazard detector according to the information of some embodiments The dynamic flow chart calculating device.
Figure 15 A-15C diagram is according to the use for activating the second hazard detector of some embodiments Interface, family.
Figure 16 diagram fills with mobile computing according to conduct second hazard detector of some embodiments First hazard detector of the bridger between putting.
Figure 17 diagram is according to the communication passing through to be set up by the first hazard detector of some embodiments The data that tunnel transmits.
Figure 18 illustrates according between the second hazard detector and the Cloud Server of some embodiments Pairing process.
Figure 19 A-19C diagram is according to the peace being used for the second hazard detector of some embodiments The optional final step of some of dress.
Figure 20 illustrates the block diagram of the embodiment of computer system.
Figure 21 illustrates the block diagram of the embodiment of special-purpose computer.
Detailed description of the invention
Describe in detail referring now to certain embodiments of the present invention as illustrated in the accompanying drawings The present invention.In the following description, many specific detail are set forth so that provide the present invention is thorough The end, understands.But, for a person skilled in the art it would be apparent that can be The present invention is put into practice in the case of there is no some or all in these specific detail.In other situation Under, do not describe well-known details in detail, in order to do not unnecessarily obscure the present invention.
Provide for the many sensings hazard detection list to intelligent networking according to one or more enforcements One or more in first or intelligent hazard detector are configured, match, control and/or program Method and system.These intelligence hazard detector can be configured and be adapted to be implemented in intelligence In energy home environment, thus the most mutual with other device in Intelligence home environment.Term " intelligence hazard detector " is used to represent in this article and can be used detection in structure (example As, family, office or another structure) the interior dangerous certain types of device occurred.So And, according to this teaching, this intelligence hazard detector can also can control other device, detection Benign dependent event (such as, security-related event) and/or work collaboratively with other device To provide supplementary features to Intelligence home environment.Although in preferred embodiment described herein One or more may upper and lower for the combined type cigarette of domestic use and CO alarm design Literary composition is particularly advantageous, it will be understood that the scope of this teaching is not so limited, because of For such as, the detection measurable characteristic in addition to danger (such as, pressure, flow rate, highly, Position, speed, acceleration, capacity, power, loudness and brightness) and monitor and/or to one Individual or multiple physical system one or more measurable characteristic responds the intelligence in the present invention In the range of this teaching of some embodiment of energy hazard detector.
It is to be appreciated that " Intelligence home environment " may refer to the family for such as single family house The intelligent environment in front yard, but the scope of this teaching is not so limited system, and this teaching is similarly suitable for But be not limited to double-deck apartment, Lian Dong house, multiple-unit apratment building thing, hotel, retail shop, Office building, industrial building and more generally have one or more intelligence hazard detection Any living space of device or working space.
It is also understood that, although terms user, client, setter, house owner, occupant, visitor People, tenant, landlord, mechanic etc. can be used to refer to just more described herein With intelligence hazard detector or a people of user interface interaction in the context of particularly advantageous situation Or many people, but these quote by be never considered about be carrying out these actions a people or Many people limit the scope of this teaching.It is therefoie, for example, terms user, client, the buyer, installation Person, subscriber and house-owner usually may refer to same people in the case of single home dwelling residence, because of May often be such that for householder and make purchase decision, buy unit and be installed and configured the people of unit, and And be also in the user of unit.But, at other scene (such as landlord-tenant environment) In, client can be landlord relative to buying unit, and setter can be local apartment custodian, First user can be tenant, and the second user is the most permissible relative to remote control functionality It is landlord.Importantly, although the identity of the people of execution action may with by embodiment Or multiple provided specific advantages has substantial connection-such as, described further herein is close The hazard detection function of code protection may be advantageous particularly in the case of landlord keeps special purpose system And hazard detection can be controlled via hazard detection device but such identity should Following description is thought and the scope that this is instructed must be limited to have those specific identities Those particular individuals.
The summary of wired home device capability
Accompanying drawing, Fig. 1 is turned to illustrate device described further herein, method, system, clothes One or more Intelligence home environment 100 that may be suitable in business and/or computer program Example.The Intelligence home environment 100 described includes structure 150, and described structure 150 can Including such as house, office building, garage or movable dwellings.It will be appreciated that, additionally it is possible to Device is integrated into Intelligence home environment 100 (the such as apartment, altogether not including total 150 Pipe apartment or working space etc.) in.It addition, this Intelligence home environment can control and/or couple To the device outside practical structures 150.It practice, the several device roots in Intelligence home environment Originally need not be physically in structure 150.Such as, pool heater or the dress of irrigation system are controlled Put and can be positioned at structure 150 outside.
The structure 150 described includes via the most separate multiple rooms of wall 154 Between 152.Wall 154 can include interior wall or exterior wall.Each room can also include floor 156 He Ceiling 158.Device can be installed on wall 154, floor 156 or ceiling 158, with Wall 154, floor 156 or ceiling 158 integrate, and/or by wall 154, floor 156 or ceiling 158 support.
In certain embodiments, the Intelligence home environment 100 of Fig. 1 include can with each other and/or With central server or cloud computing system seamless integration to provide various useful wired home mesh Multiple devices of any one in mark, sense the device of networking more including intelligence.Wired home ring Border 100 can include one or more intelligence sense more networking thermostat 102 (hereinafter by Referred to as " intelligent thermostat 102 "), many sensings hazard detection list of one or more intelligent networking Unit 104 (hereinafter referred to as " intelligence hazard detector 104 ") and one or more intelligence The ingress interface device 106 (hereinafter referred to as " intelligent doorbell 104 ") of networking can be sensed more. According to embodiment, intelligent thermostat 102 detects ambient climate characteristic (such as, temperature and/or wet Degree) and correspondingly control HVAC system 103.Intelligence hazard detector 104 can detect The material (such as, cigarette, fire or carbon monoxide) of dangerous substance and/or instruction dangerous substance Exist.Intelligent doorbell 106 can detect people and close to position (such as, external door) or leave position Put (such as, external door), control doorbell function, come notifier's via audio frequency or vision means It is toward or away from, or controls the setting in security system (such as, with when occupant makes a return journey Activate or deactivate security system).
In certain embodiments, the Intelligence home environment 100 of Fig. 1 farther includes one or many Individual intelligence senses the wall switch 108 (hereinafter referred to as " intelligence wall switch 108 ") of networking more And one or more intelligence senses the flush receptacle interface 110 of networking (hereinafter referred to as more " intelligence flush receptacle 110 ").Intelligence wall switch 108 can detect ambient light conditions, detection Room seizure condition, and control power and/or the dimmed state of one or more lamp.At some In the case of, intelligence wall switch 108 can also control fan (such as ceiling fan) power rating or Speed.Intelligence flush receptacle 110 can detect taking of room or enclosure wall, and control electric power to The supply of one or more flush receptacles is (such as so that not to socket in the case of nobody home Supply electric power).
Further, in certain embodiments, the Intelligence home environment 100 of Fig. 1 includes many Individual intelligence senses the utensil 112 (hereinafter referred to as " intelligent appliance 112 ") of networking more, Such as refrigerator, electric furnace and/or baking oven, TV, washing machine, dryer, lamp, stereophonic sound system, Intercom system, garage door opener, flooring fan, ceiling fan, wall type air conditioner, pond add Hot device, irrigation system, security system etc..According to embodiment, the utensil 112 of networking by with The corresponding manufacturer of utensil cooperates and becomes and Intelligence home environment compatibility.Such as, utensil is permissible It is space heater, window AC unit, electrical line ventilating opening etc..When inserted, utensil Can be such as that what kind of utensil to notice it this to intelligent home network by indicating it Body, and it can automatically control with wired home integrate.Ability can be passed through Any wired or wireless communication agreement known to the those of ordinary skill in territory promotes to pass through utensil This communication to wired home.Wired home can also include various non-communicating conventional appliances 140, all if controlling (even if (ON/OFF) cursorily) by means of small-sized flush receptacle 110 The dish-washing machine/dryer, refrigerator etc. of old-fashioned routine.Intelligence home environment 100 is further able to Including can be by by intelligence hazard detector 104 or the intelligence IR signal that provides of wall switch 108 The various conventional appliances 142 partly communicated controlled, the wall that the most infrared (" IR ") controls The device that formula air-conditioner or other IR control.
According to embodiment, the dangerous inspection of the intelligent thermostat 102 of Intelligence home environment 100, intelligence Survey device 104, intelligent doorbell 106, intelligence wall switch 108, intelligence flush receptacle 110 and other Device is modular, and can be incorporated in old room and new house.Such as, device is to enclose Around by two basic modules: modular platform that head unit and backboard are constituted and design, described Modular platform is also known as Docking station.Provide multiple configurations of Docking station so as with any family Front yard (the oldest room and new house) is compatible.But, all of Docking station includes that standard header connects cloth Put so that any head unit can be removably attached to any Docking station.Therefore, at some In embodiment, Docking station is used as the structure of family and the interface of the physical connection of voltage wiring, And interchangeable head unit comprise the sensor of device, processor, user interface, battery with And whole in other functional unit.
Intelligence home environment 100 can also include with physics family is outside but connecing in family The communication of the device in the range of near-earth reason.Such as, Intelligence home environment 100 can include to intelligence Other device communication current pond temperature or reception in energy home environment 100 are used for controlling water The pool heater monitor 114 of the order of pond temperature.Similarly, Intelligence home environment 100 can With communicate in being included in Intelligence home environment 100 information about irrigation system and/or reception For controlling the irrigation monitor 116 of the control information of such irrigation system.According to embodiment, Algorithm is provided for such as based on family postcode or geographical coordinate considers wired home The geographical position of environment 100.Then geography information is used to obtain for determining water optimal Time helpful data, such data can include position of sun information, temperature, make a reservation for The soil types etc. on the land that point, family are positioned at.
By means of network connectivity, even if user keeps off in device, the wired home dress of Fig. 1 It is mutual with device that one or more in putting also are able to further allow for user.Such as, Yong Huneng Enough use computer (such as, desktop computer, laptop computer or flat board) or other is just Portable electronic apparatus (such as, smart phone) 166 communicates with device.Webpage or app Can be configured to receive communication from user and control device based on communication and/or present to user Information about the operation of device.Such as, user can employ a computer to check working as of device Front set-point temperature also adjusts it.User may during this telecommunication in the structure or Structural outer.
As discussed, user can use computer or the portable electron device 166 of networking Control the intelligent thermostat in Intelligence home environment 100 and other intelligent apparatus.Show at some In example, some or all (such as, living individuality at home) in occupant can be to intelligence Home environment 100 registers their device 166.Such note can be made at central server Volume, to use dress by occupant and/or device authentication for being associated with family and giving occupant Put the license of the intelligent apparatus controlled in family.Such as when occupant is when working or on holiday, Occupant can use device 166 that they register to remotely control the intelligent apparatus of family. When occupant is physically located household internal, such as, just it is being sitting in the bed of household internal as occupant Time upper, occupant can also use device that they register to control intelligent apparatus.It should be appreciated that Replacing or in addition to register device 166, Intelligence home environment 100 is also made about which individual It is occupant and which device 166 and pushing away that those individualities are associated at home and therefore that body is lived Opinion.Therefore, whom Intelligence home environment " learns " is occupant and license and those individual phases The device 166 of association controls the intelligent apparatus of family.
In certain embodiments, in addition to comprising process and sensing function, device 102,104, 106, each in 108,110,112,114 and 116 (being collectively referred to as " intelligent apparatus ") Individual have with other intelligent apparatus any in intelligent apparatus and with network the most Anywhere Any central server or cloud computing system or the data communication of other device any and information altogether Enjoy ability.Various customization or standard wireless protocol (Wi-Fi, ZigBee, 6LoWPAN can be used Deng) in any one and/or various customization or standard cable agreement (CAT6 Ethernet, HomePlug etc.) in any one perform required data communication.It is probably particularly useful A kind of certain types of agreement be RF communication protocol based on 802.15.4, described RF communicate Agreement can adapt to the low power communication in the middle of battery-operated device, is also adapted in the middle of device Netted networking, and also adapt to IPv6 route and tcp/ip communication.
According to embodiment, all or some in intelligent apparatus can act as wirelessly or non-wirelessly forwarding Device.Such as, first in intelligent apparatus can be via wireless router 160 and intelligent apparatus In second communicate.Intelligent apparatus can also be via to network (such as internet 162) Connection communicate with each other.By internet 162, intelligent apparatus can with central server or Cloud computing system 164 communicates.Central server or cloud computing system 164 can with and dress Put manufacturer, support entity or the service provider being associated to be associated.For an embodiment, User can use device itself to carry out contact customer support, without using such as phone Or connect other means of communication of the computer of internet.It addition, can from central server or Cloud computing system 164 automatically sends software upgrading and (such as, when applicable, works as quilt to device It is spaced during purchase or with routine).
According to embodiment, intelligent apparatus combination is to create mouthpiece in intelligent home network 100 With the mesh network of low power nodes, wherein some in intelligent apparatus are " mouthpiece " nodes And other intelligent apparatus is " low-power " node.Intelligent apparatus in Intelligence home environment 100 In some be battery powered, and other intelligent apparatus has routine and reliable power supply, all As by being connected to wiring after the wall 154 of Intelligence home environment (such as, to 120V line Voltage wires).The intelligent apparatus with routine and reliable power supply is referred to as " mouthpiece " joint Point.These nodes are equipped with any wireless protocols of use or mode promotes and wired home net In other devices various in network 100 any one and with central server or cloud computing system The two-way communication of 164.On the other hand, battery powered device is referred to as " low-power " node. These nodes are often little than mouthpiece node, and be only capable of use need the wireless of little power Agreement (such as Zigbee, 6LoWPAN etc.) communicates.It addition, some and not all low merit Rate node can not two-way communication.These low power nodes send message, but they can not " be detectd Listen ".Therefore, other device in Intelligence home environment 100 (such as mouthpiece's node) is no Information can be sent to these low power nodes.
As described, intelligent apparatus is used as low-power and mouthpiece's node with at wired home net Network 100 creates mesh network.Single low power nodes in Intelligence home environment is termly Send the message what is just sensing about them, and other the low merit in Intelligence home environment Rate node also forwards message in addition to sending the message of themselves, so that message is throughout intelligence Home environment 100 is advanced from node-to-node (that is, device is to device).Intelligence home environment Mouthpiece's node in 100 can " decline " to low power communication agreement to receive these message, It is other communication protocol by message transformation, and inverted message is sent to other mouthpiece Node and/or central server or cloud computing system 164.Therefore, low power communication agreement is used Low power nodes can cross over whole Intelligence home environment 100 and by internet 162 to Central server or cloud computing system 164 send message.According to embodiment, mesh network makes Central server or cloud computing system 164 can in the intelligent apparatus from family whole periodically Ground receives data, infers based on these data, and order is sent back in intelligent apparatus One to realize some in wired home target described herein.
As described, some in mouthpiece's node and low power nodes can " be intercepted ". Therefore, user, other device and central server or cloud computing system 164 can be to low merits Rate node communication controls.Such as, user can use portable electron device (such as, intelligence Phone) 166 to send order, institute by internet to central server or cloud computing system 164 State central server or cloud computing system 164 then by command auto repeat to Intelligence home environment 10 Mouthpiece's node.Mouthpiece's node drops to low-power agreement to incite somebody to action throughout Intelligence home environment Command communication is to low power nodes, and communication is not to from central server or cloud computing system 164 Directly receive other mouthpiece's node of order.
The example of low power nodes is intelligence night-light 170.In addition to accommodating light source, intelligence noctilucence 170 receivings take sensor (the most ultrasonic or passive IR sensor) and surrounding light sensor, The photo-resistor of the light in such as measurement room or single element sensor.In certain embodiments, Intelligence night-light 170 is configured to when light sensors about to room dark and at it Take sensor and activating light source when someone is in a room detected.In other embodiments, intelligence Night-light 170 is configured simply to when light sensors about to room dark activate light Source.It addition, according to embodiment, intelligence night-light 170 includes sending accounting for of relevant room termly With and room in the message of light quantity (include and take sensor and detect that people is present in room In consistent instant message) low power wireless communication chip (such as, ZigBee or other base Chip in 802.15.4).As mentioned above, it is possible to use mesh network comes in intelligence From node-to-node (that is, intelligent apparatus is to intelligent apparatus) and pass through in home environment 100 Internet 162 transmits wirelessly these message to central server or cloud computing system 164.
Other example of low power nodes includes the battery-operated version of intelligence hazard detector 104 This.These intelligence hazard detector 104 are frequently located in the district that can not access constant and firm power In territory, as discussed in more detail below, any number and type of sensor can be included, Such as cigarette/fire/heat sensor, carbon monoxide/carbon dioxide sensor, take/motion sensor, Surrounding light sensor, temperature sensor, humidity sensor etc..Additionally, such as by using such as Mesh network described above, intelligence hazard detector 104 can to other device and in Centre server or cloud computing system 164 send the message corresponding to each in respective sensor.
The example of mouthpiece's node includes that intelligent doorbell 106, intelligent thermostat 102, intelligence wall are opened Pass 108 and intelligence flush receptacle 110.These devices 102,106,108 and 110 are frequently located in can By near power supply and be connected to reliable source of power, and therefore, it is possible to include more power consumption components, All if carry out one or more communication chips of two-way communication with any various agreements.
In certain embodiments, mesh network can be used to along with people is transitioned into room from room And be automatically turned on and turn off lamp.Such as, low-power and mouthpiece's node (such as, device 102, 104,106,108,110,112 and 170) detection people is by the movement of Intelligence home environment also And the message of the correspondence that communicated by mesh network.Use and indicate the occupied message in which room, Central server or cloud computing system 164 or certain other device activate and deactivate intelligence wall and open Close 108, automatically carry to move to room from room along with people in Intelligence home environment 100 For light.It addition, user can provide which intelligence flush receptacle 110 of instruction to electric light and other light Source (such as intelligence night-light 170) provides the preconfigured information of electric power.As an alternative, light source is inserted to wall This mapping of seat 110 can be automatically completed (such as, how intelligence flush receptacle 110 detects light source Time be inserted into wherein, and it to central server or cloud computing system 164 send correspondence Message).It is used in conjunction with this map information with indicating the occupied message in which room, in Centre server or cloud computing system 164 or certain other device activate and deactivate to electric light and its Its light source provides the intelligent flush receptacle 110 of electric power, in order to along with people move to room from room and with The movement of track people also provides light.
In certain embodiments, the mesh network of low-power and mouthpiece's node can be used to Exit lighting is in emergency circumstances provided.In some cases, in order to promote this, user provides The preconfigured information of the exit route in indicating intelligent home environment 100.Such as, for house In each room, user provides the map of optimal exit route.It should be appreciated that replace user This information, central server or cloud computing system 164 or certain other device is provided to use The map in wired home house, chart, structure chart and the use uploaded are based on from mesh network The positional information that obtains of node and the map that generates to automatically determine route (such as, from The positional information of device is used to construct the map in house).In operation, it is activated when warning Time (such as, when one or more cigarette being detected and activating report in intelligence hazard detector 104 Time alert), central server or cloud computing system 164 or certain other device use from low-power The occupied information obtained with mouthpiece's node determines which room is occupied, then from taking Room rise along exit route turn on lamp (such as, night-light 170, wall switch 108, to electric light supply The flush receptacle 110 etc. of electricity) to provide emergency-exit lighting.
What the exemplary Intelligence home environment 100 at Fig. 1 farther included and illustrated is each It is configured to perform the service robot 163 of any one in various family expenses tasks from master mode. For some embodiments, service robot 162 can be individually configured Cheng Yiyu such as by horse Sa ROOMBA (TM) that the iRobot company of Zhu Sai state Bedford is sold and The mode that the mode of the known device being commercially available of SCOOBA (TM) product is similar is held Row sweep the floor, wash etc..The most such as sweep the floor and wash ground task can be recognized For being " leaving " or " wearing down " task because the most more desirable occupant not in the presence of hold These tasks of row.For other embodiments, one or more in service robot 162 are joined It is set to perform such as to play music for occupant, as the local thermostat of occupant, as occupying Live the local air monitor/clarifier of person, be used as local baby monitor, as occupant's The task of local danger detector etc., the most more desirable holding when occurring immediately human occupants These tasks of row.For purposes of this description, such task can be considered as " towards people Class " or " anthropocentric " task.
Fig. 2 diagram can be with multiple Intelligence home environment (Intelligence home environment 100 of such as Fig. 1) Integrated expandable device and the network level view of service platform 200.Expandable device and service Platform 200 includes remote server or cloud computing framework 164.Dress from the intelligent networking of Fig. 1 Put 102,104,106,108,110,112,114 and 116 (simple in this paper Fig. 2-3 Singly be designated " intelligent apparatus ") in each can be with remote server or cloud computing frame Structure 164 communicates.For instance, it is possible to directly (such as, use the 3G/4G of wireless carrier Connectivity), by line concentration network 212, (it can be to change (such as, from simple wireless router Until and including the special overall home control node of intelligence) scheme) or by its any group Incompatible foundation is to the connection of internet 162.
Although in some examples provided in this article, device and service platform 200 and Fig. 1 The intelligent apparatus of Intelligence home environment 100 communicate and from the Intelligence home environment of Fig. 1 The intelligent apparatus of 100 collects data, it would be appreciated that device and service platform 200 and full generation Multiple Intelligence home environment on boundary communicate and receive from global multiple Intelligence home environment Collection data.Such as, central server or cloud computing system 164 can be from one or more intelligence The device of home environment collects family data 202, and wherein device can send family data routinely Or house can be sent (such as, when device inquiry family data 202) under specific circumstances Front yard data.Therefore, device and service platform 200 collect data from global family routinely. As described, collected family data 202 include such as power consumption data, take data, HAVC arranges and uses data, carbon monoxide level data, carbon dioxide level data, waves Send out property organic compound levels data, sleep planning data, culinary art planning data, inside and outward Portion's temperature humidity data, TV audience data, inside and outside noise level data etc..
Central server or cloud computing framework 164 can also provide one or more service 204. Service 204 can include such as software upgrading, customer support, sensor data collection/record, Remote access, long-range or distributed AC servo system or use suggestion are (such as, based on the family's number collected Performance, reduction effectiveness cost etc. is improved) according to 202.Can will be associated with service 204 Data are stored at central server or cloud computing system 164, and central server or cloud meter Calculation system 164 can be at reasonable time (such as, with aturegularaintervals, receiving from user During request etc.) retrieve and send data.
As illustrated in Figure 2, the embodiment of expandable device and service platform 200 includes place Reason engine 206, described process engine 206 can concentrate at individual server or be distributed in number In the middle of individual different computational entity, and unrestricted.Process engine 206 can include being configured Become (such as, via internet or line concentration network) from the device of Intelligence home environment receive data, Data are indexed, data is analyzed and/or based on analyzing or as analyzed Divide the engine generating statistics.Data through analyzing can be as family data 208 quilt obtained Storage.
Hereafter can be sent back to provide for the family obtaining result by the result analyzed or add up The device of data, to other device, provides the server of webpage to the user to device, or To other non-device entity.Such as, statistics, the use of use relative to other device are used The statistics of statistics, use pattern and/or summary sensor reading can be generated by processing engine 206 And send.Result or statistics can be provided via internet 162.By this way, process Engine 206 can be configured and program and obtains various useful information from family data 202. Individual server can include one or more engine.
Fig. 3 diagram is with specific reference to processing engine 206 and the device (wired home of such as Fig. 1 Those devices of environment 100) the expandable device of Fig. 2 and the abstract merit of service platform 200 Can view.Even if the device being positioned in Intelligence home environment will have various unlimited different list Solely cap abilities and limitations, they the most all can be considered to share common features, because in them Each be data consumer 302 (DC), data source 304 (DS), service consumer 306 (SC) and service source 308 (SS).Advantageously, them are realized except providing for device This locality and immediately outside necessary control information needed for target, expandable device and service platform 200 can also be configured to administer the mass data flowing out these devices.Except strengthening or optimizing dress Put itself relative to the practical operation of their function immediately outside, expandable device and service are flat Platform 200 can point at various automations, extendible, flexibly and/or telescopic side Formula " recycles " these data and realizes various useful target.Can based on such as use pattern, Unit efficiency and/or user's input (such as, request specific function) predefine or self adaptation Ground identifies these targets.
Such as, process engine 206 is shown as including many examples 310 by Fig. 3.Process engine 206 can include monitoring and manage the main or managed service example 310a of secondaries function. Apparatus function guarantee in the case of can being included in given user input device suitably operation, Estimate invader is just attempting (such as, and to invader whether to attempt in dwelling in dwelling Situation respond), detection is couple to the fault of equipment of device (such as, bulb puts out Go out), realize or otherwise energy requirement response events is responded, or to Report to the police the event or characteristic in future of current or prediction in family.Process engine 206 can also include based on Device make for estimate characteristic (such as, demographic information) that user is interested, expectation and/ Or advertisement/communication paradigms 310b of product.Then can provide a user with or be automatically provided clothes Business, sales promotion, product or upgrading.Process engine 206 and can also include social example 310c, institute State social example 310c and use the information from social networks, provide information (example to social networks As, use based on device), and/or the friendship to user and/or device with social network-i i-platform Inter-related data process.For instance, it is possible to based on light detection, security system inertia Or device use detector update user as to they on social networks trust contact The state of people's report is to indicate when they are in.As another example, user can be with Other user's sharing means use statistics.In another example, user can share cause low The HVAC of bill is arranged, and HVAC can be arranged and download to them by other users Intelligent thermostat 102 to reduce their bill.
The summary of intelligence hazard detector framework
With reference now to Fig. 4 A and Fig. 4 B, it is illustrated that be used as intelligence as described earlier The hazard detector 400 of a part for home environment 100.Fig. 4 A illustrates hazard detector 400 Exploded perspective view, and Fig. 4 B illustrate same hazard detector 400 assembled view.At one In embodiment, hazard detector 400 be arranged to detect cigarette existence and send out alarm sound with One or more occupants to family or structure alert potential fire or other threatens audibly Smoke detector.In other embodiments, hazard detector 400 can be Carbon Monoxide Detection Device, thermal detector etc..In one embodiment, hazard detector 400 be include smoke detector, Many sensings detector of carbon monoxide detector, thermal detector, motion detector etc..This teaching In many be to have especially for the embodiment that hazard detector 400 is many sensing detectors Profit, especially because be combined to together in single assembly by various sensing modes can be relative to Device tight ness rating, assembly power supply and overall assembly domination and cooperation in one or more propositions Necessary challenge.
In order to facilitate when being described herein as embodiment, device 400 will herein be referred to as intelligence Energy hazard detector or hazard detector 400, but it is to be understood that, hazard detector 400 can To include that the scope of other devices various and this teaching is not necessarily limited to requirement detection cigarette as exception One of hazard detector.It is therefoie, for example, depend on as upon reading this disclosure for ability Specific context, favourable spy described herein is will become apparent to for the technical staff in territory One or more can being easily adaptable sought peace in embodiment only detects carbon monoxide and motion Or only detection pollen and motion or only the multi-functional dangerous of detection noise pollution and pollen etc. pass Sensor.But, cigarette is detected function and does not cause by this teaching with the combination of other sensing function One or more solved one or more especially problematic problems.
In one embodiment, hazard detector 400 has about 120 to 134mm The object of the most square or rectangular shape of the thickness of width and about 38mm.In other words, Hazard detector 400 is the wall or ceiling having and can being easily attachable to family or structure The compactest shape and size so as can to detect in the middle of other function cigarette existence and to Occupant therein reports to the police many sensings unit of potential fire threat.As shown in Figure 4 A, dangerous Detector 400 includes that the wall that can be attached to building or structure is so that hazard detector 400 is solid Surely its installing plate 410 is arrived.Hazard detector 400 also includes can be mounted to installing plate 410 Backboard 420 and can couple or be otherwise affixed to backboard 420 with backboard 420 Procapsid 460, with limit there is the inner area that the assembly of hazard detector 400 is included The shell in territory.Circuit board 500 can couple or be attached to backboard 420 with backboard 420.Permissible Circuit board 500 is installed various assembly.Such as, smoke-box 430 can be with circuit board 500 coupling Connect or be arranged on circuit board 500 and be configured to detect the existence of cigarette.An enforcement In example, can be relative to installing smoke-box 430 in the middle of circuit board 500 so that air can be from electricity Smoke-box 430 is flowed into above road plate 500 and in circuit board 500 location below.Can also be at circuit Loudspeaker 550 and warning device (unnumbered) are installed to examine via smoke-box 430 on plate 500 Measure in the presence of cigarette and to report to the police potential fire threat to occupant audibly.Can be as herein Described in other assembly, such as motion sensor, an oxygen are installed on circuit board 500 Change carbon sensor, microprocessor etc..
In one embodiment, protection board 440 can be attached to circuit board 500 or with other Mode couples with circuit board 500, to provide in vision to the intraware of hazard detector 400 Go up the most desirable outward appearance and/or air-flow injected or is directed to smoke-box 430.Such as, when user's example During as checked the intraware of hazard detector 400 by the aperture in backboard 420, protection Plate 440 can provide the outward appearance on the surface of relative smooth and otherwise hide circuit board 500 Assembly or circuit.Protection board 440 can similarly be used for from the aperture of backboard 420 towards cigarette Room 430 guides the flowing of air, in order to promote that air flows in and out smoke-box 430.
Hazard detector 400 can also include being configured to hazard detector 400 not with outside Each to hazard detector 400 when power supply (the 120V power supply of such as family or structure) couples Plant assembly and the battery pack 450 of electric power is provided.In certain embodiments, cover plate 470 can be with fore shell Body 460 couples to provide the most desirable outward appearance and/or for it to hazard detector 400 Its functional purpose.In a particular embodiment, cover plate 470 can include allowing and circuit board 500 The one or more sensors coupled checked by the surface of cover plate 470 or see multiple Hole or opening, in order to sensing is at the object outside hazard detector 400.Cover plate 470 multiple There is provided the most desirable when opening can be arranged in being checked by the occupant of family or structure Outward appearance.In one embodiment, can according to repeat pattern (such as Fibonacci or other Sequence) arrange multiple openings of cover plate 470.
Lens button 600 can couple with cover plate 470 or be otherwise mounted to cover plate 470.Lens button 600 can allow one or more sensor by thoroughly for various purposes Mirror button 600 is checked.Such as, in one embodiment, passive IR sensor (not shown) Can be positioned in lens button 600 below and be configured through lens button 600 check with Detect one or more occupant to be present in family or structure.In certain embodiments, lens Button 600 can function as to press various orders are input to hazard detector 400 by user Button, such as with the warning that triggers in response to false or the most harmless condition of closedown.Location Can be arranged to such as from LED or another luminous unit in lens button 600 distally below Part receives the aperture 620 of light, and it is interior to provide desired visual appearance to make light be dispersed in circle 620, The such as halo after lens button 600.Be positioned at aperture 620 distally below can be Including one or more electric components (such as passive IR sensor (hereinafter pir sensor), LED etc.) flexible PCB 640.Flexible PCB 640 (hereinafter flexible rings 640) Can with circuit board 500 electric coupling, with during the operation of hazard detector 400 from being arranged on One or more microprocessor communication on circuit board (not shown) and/or reception instruction.At figure 5A-5D and Fig. 6 A-6F describes the additional detail of the assembly of hazard detector 400.
Fig. 4 B diagram is assembled with the hazard detector 400 of various assembly.Specifically, this illustrates The assembling with other assemblies various in the inner space being included in hazard detector 400 configures In installing plate 410, procapsid 460, backboard 420 and cover plate 470.This figure also illustrates that formation The visually conjunction can checked by the occupant in the mounted room within it of hazard detector 400 Multiple holes of the cover plate 470 of the design of meaning or opening.Lens button 600 is shown as being attached to Hazard detector 400 is to be centrally located relative to cover plate 470.As being briefly described, Aperture 620 can be used near lens button 600 and be provided behind the halo outward appearance of light. The hazard detector 400 being assembled provides the most multi-functional compact device.
With reference now to Fig. 5 A and Fig. 5 B, it is illustrated that the front stereogram of circuit board 500 and rear solid Figure.Circuit board 500 includes the main body 502 with leading flank or surface and trailing flank or surface.As Described herein, various electric components are installed on circuit board 500.Implement at some In example, these assemblies can be arranged on the front surface of circuit board 500, at circuit board 500 The rear surface relative with front surface on or on two surfaces of circuit board 500.Such as, In a particular embodiment can be by one or more microprocessors and/or other processor associated component Be arranged on circuit board 500 in the face of protection board 440 rear surface on, the most one or more merits Can assembly (such as, warning device, CO detector, loudspeaker, motion sensor, Wi-Fi Device, Zigbee device, 802.15.4 device etc.) be installed in circuit board 500 in the face of dangerous On the front surface in the room that detector 400 is positioned in family therein or structure.Can be relative Other assembly is installed in the middle of the circuit board 500 so that apparent surface as described herein that Sample is installed in the opposite side of circuit board 500.
As shown in Figure 5 A, in a particular embodiment the front surface of circuit board 500 can include by It is configured to detect the existence of CO gas and be confirmed as too in CO gas level The CO detector 570 of warning device 560 is triggered in the case of height.(it can for warning device 560 Being that there is the deliberately sharp-pointed or piezoelectric buzzer of harshness) electricity can be likewise mounted on On the front surface of road plate 500, in order in the face of hazard detector 400 is positioned in room therein Occupant to report to the police potential threat to occupant.Warning device 560 may be configured to produce One or more sound or direction of signal occupant report to the police potential threat.Front surface can also include Loudspeaker 550 is positioned in region 552 therein.Loudspeaker 550 may be configured to room Occupant audible warning or message are provided.Such as, loudspeaker 550 can be reported to occupant Warn potential threat and indicate occupant to exit room.In certain embodiments, loudspeaker 550 Specific instruction can be provided, such as when exiting room and/or family or structure to occupant The exit route used.Can similarly communicate other message to occupant, such as with to inhabitation Person reports to the police, and battery is low, CO level of relative is higher in a room, hazard detector 400 needs the cycle Property clean or to occupant report to the police relevant with hazard detector 400 or its assembly any its Its exception or problem.
Circuit board 500 can also include the one or more motion-sensings installed on its front surface Device.Motion sensor can be used to determine individuality be present in hazard detector 400 room or In peripheral region.This information can be used to change as previously described at community network The hazard detector 400 of middle connection and/or the function of other device one or more.Such as, may be used Deposit with the occupant notifying this thermostat family or structure this information being relayed to intelligent thermostat So that this intelligent thermostat can regulate according to one or more study or arranging of programming Room or result.This information similarly can be used for one or more mesh by hazard detector 400 , such as to make warning fill as described herein or due to other reasons various Put peace and quiet (such as gesture solemn silence).
In one embodiment, the first ultrasonic biography can be installed on the front surface of circuit board 500 Sensor 572 and the second sonac 574.Two sonacs 572 and 574 can be axial Ground skew is to point in slightly different directions.In this orientation, each sonac can To be used to detect individual relative to the orientation in room and/or occupant based on hazard detector 400 The motion of body.The individual motion of detection can be used to as described herein (i.e., Gesture solemn silence) or make warning device quiet due to other reason any.An embodiment In, the axis of the first sonac 572 can be oriented relative to hazard detector 140 Essentially outward, and the axis of the second sonac 574 is oriented at ultrasonic relative to first At one angle of the axis of sensor 572.When hazard detector 400 be installed in family or Time on the ceiling of structure, the first sonac 572 can sense the motion of individuality.Because First sonac 572 is oriented essentially outward relative to hazard detector 400, institute Substantially seem directly to be placed under hazard detector 400 with the first sonac 572 On body.When on the wall that hazard detector 400 is installed in family or structure, the second ultrasonic biography Sensor 574 can sense the motion of individuality similarly.Because the second sonac 574 is determined To at an angle relative to the first sonac 572 and hazard detector 400, institute With the second sonac base when on the wall that hazard detector 400 is installed in family or structure Downwardly floor rather than seem as the first sonac 572 is seemed on Ben Direct out.In one embodiment, the angular variation of two sonacs can be about 30 ° Or any other desired value.
As shown in figs. 5 a and 5b, the main body 502 of circuit board 500 also includes substantially existing The aperture 504 of centralized positioning, smoke-box 430 is inserted into by described aperture 504 with relative to circuit Smoke-box 430 is installed in the middle of plate 500.Aperture 504 can also include for inserting electric wire so that smoke-box 430 with a pair notch 506 of circuit board 500 electric coupling.As described earlier, aperture is passed through Install in the middle of 504 smoke-boxes 430 allow cigarette and the air front surface from circuit board 500 or side and Both the rear surface of circuit board 500 or side enter smoke-box 430.Presently describe on circuit board 500 The various aspects of electric component, the position thereon of many electric components is in view of described herein Will be apparent from for skilled reader with Fig. 5 A-5B.It is included in circuit board 500 On can be several assembly, including system processor, relative high powers radio communication circuit and Antenna, relative low-power radio communication circuit and antenna, nonvolatile memory, audio frequency are raised one's voice Device 550, one or more interface sensor, safe processor, safety sensor, warning device 560, power supply and power supply circuits.The circuit that these assemblies are operable as using power consumption to minimize is opened up Flutter with power budget approach to provide fault secure safety detection feature and user interface features.Root It is used for processing hazard detection according to a preferred embodiment, bifurcated or hybrid processor circuit topology The various features of device 400, wherein, safe processor is to be exclusively used in as reported to the police at conventional cigarette/CO The core security sensor domination provided on device is relatively small relative thin with core warning function Processor, and wherein, system processor is that to be exclusively used in such as cloud communication, user interface special Levy, take the higher level feature with other senior environment tracking characteristics and more generally will not by It is considered the phase of other task any of " core " or " conventional " safe sensor and warning task To bigger of a relatively high power programmer.
By way of example rather than by restriction by the way of, safe processor can be Freescale KL15 microcontroller, and system processor can be Freescale K60 microcontroller Device.Preferably, safe processor is programmed and configured as allowing it to regardless of system processor Situation or state the most all operate and perform its core security related responsibility.It is therefoie, for example, Even if system processor is unavailable or additionally can not perform any function, safe processor also will Continue executing with its core security inter-related task so that hazard detector 400 still meets offer danger All works required for cigarette, CO and/or other safety-related supervision that danger detector 400 is targeted Industry and/or government safety standards are (certainly, it is assumed that there are can be used for the enough of safe processor operation Electric power).On the other hand, system processor performs to be potentially referred to as being covered to safe processor The thing of " optional " or " senior " function functionally, wherein " optional " or " senior " Refer to the task of not being to need clearly in accordance with industry and/or government safety standards.Therefore, although System processor is designed to improve the overall performance of hazard detector 400, feature set And/or the mode of function and safe processor interactive operation, but its operation is not for allowing dangerous inspection Survey device 400 to meet required for core security related industries and/or government safety standards.As logical Processor that is bigger than safe processor and that be more able to, system processor will be generally at system The power more than safe processor is consumed during the both activities of reason device and safe processor.
Similarly, when two processor inertias, system processor will still consume and compare safety The power that processor is many.System processor can be operable as processing user interface features And monitor interface sensor (the most the most not relevant with core security sensing take sensor, Audio sensor, camera etc.).Such as, system processor can guide high power radio communication Wireless data service on circuit and low power wireless communication both circuits, accesses non-volatile depositing Reservoir, communicates with safe processor, and makes audio frequency send from loudspeaker 550.As Another example, system processor can monitor that interface sensor is any to determine the need for taking In response to user, action (such as, detects that the action of alarm to be made solemn silence is closed ear-piercing Report to the police).Safe processor can be operable as processing the core security phase of hazard detector 400 Pass task.Safe processor can poll safety sensor (such as, cigarette, CO) and peace One or more instructions in full sensor activate warning device 560 when hazard event being detected.Peace Full processor can operate independent of system processor, and can be regardless of at system processor Warning device 560 is all activated under what state.Such as, if system processor is carrying out swashing Function of living (such as, perform Wi-Fi update) or be closed due to power constraint, then work as inspection When measuring hazard event, safe processor remains able to activate warning device 560.
In certain embodiments, the software run on safe processor can be secured permanently And may after hazard detector 400 leaves factory from not via software or firmware update into Row updates.Compared with system processor, safe processor is the processor consuming less power. Safety sensor compares energy with use system processor to do this to use safe processor to monitor Enough produce power conservation, because safe processor may constantly monitor safety sensor.As Really system processor constantly monitors safety sensor, then may unrealized power conservation.Except logical Cross and safe processor being used for monitoring, safety sensor, to outside realizing power conservation, makes processor Bifurcated also can ensure that the security feature of hazard detector 400 works always, regardless of higher level Whether user interface works.Relative high powers radio communication circuit can be such as can basis Any one Wi-Fi module communicated in 802.11 agreements.
By way of example, it is possible to use Broadcom BCM43362 Wi-Fi module is come real Existing relative high powers radio communication circuit.Relative low-power radio communication circuit can be can root Low-power wireless territory net (6LoWPAN) module that communicates according to 802.15.4 agreement or ZigBee module.Such as, in one embodiment, it is possible to use Ember EM357 6LoWPAN Module realizes relative low-power radio communication circuit.Nonvolatile memory can be such as example Any such as NAND Flash, hard disk drive, NOR, ROM or phase transition storage is suitable for Permanent memory storage.In one embodiment, can store can for nonvolatile memory Use the audio clips that loudspeaker 550 is play.Audio clips can include one or more languages The installation instruction of speech or warning.Interface sensor can include the biography monitored by system processor Sensor, and safety sensor can include the sensor that monitored by safety sensor.Can be by Sensor 220 and 232 is installed to printed circuit board (PCB), and (such as, processor 210 and 230 is pacified Install to same plate), flexible printed circuit board, the shell of system 205 or a combination thereof.
Interface sensor can include that such as surrounding light sensor (ALS) (such as can use Discrete light electric diode realizes), passive infrared (PIR) motion sensor (such as can make Realize by Excelitas PYQ1348 module) and one or more sonac is (such as One or more Manorshi MS-P1640H12TR module can be used to realize).Safety passes Sensor can include such as cigarette sensing chamber 430 (it can use such as Excelitas IR module), CO detection module 570 (it can use such as Figaro TGS5342 sensor) and temperature With humidity sensor (it can use such as Sensirion SHT20 module).Power supply can supply Answer electric power so that the operation of hazard detector can be realized and can include any applicable energy Source.Embodiment discussed herein can include AC line power, battery electric power, AC line The combination of road electric power and reserve battery and (such as, USB supplies at the DC electric power of outside supply The electric power answered).Use AC line power, use the AC line power or outside of reserve battery The embodiment of the DC electric power of portion's supply can stand the electric power different from only cell embodiments and preserve Constraint.
Preferably, the most battery powered embodiment is designed to manage the power consumption of finite energy supply, Hazard detector 400 is operated up to and lacks seven (7), eight (8), nine (9) or ten (10) The minimum time section in year.The embodiment of line powering is the most constrained.Use reserve battery line The embodiment that road powers can use power conservation methods to extend the life-span of reserve battery.Only In cell embodiments, power supply can include one or more battery, such as battery pack 450.Battery By different component (such as, alkali or lithium ion disulphide) structures, and can be able to make With different terminal use's configurations (such as, permanent, user is removable or non-user can be more Change).In one embodiment, it is possible to by Li-FeS2Six unit be arranged in three double heaps In Die.This layout can produce the total available of about 27000mWh for hazard detector 400 Power.
With reference now to Fig. 5 C and Fig. 5 D, it is illustrated that with circuit board 500 electric coupling to connect from it Receive the front stereogram of the loudspeaker 550 of instruction and rear stereogram.Loudspeaker 550 includes loudspeaker Main body 552 and permission loudspeaker 550 couple or are arranged on procapsid 460 with procapsid 460 On one or more mounting flanges 554.Loudspeaker 550 also includes socket 556 or allows to raise Sound device 550 and other mounting assembly of circuit board 500 electric coupling.As described earlier, raise Sound device 550 can be used to be positioned room within it to hazard detector 400 audibly Occupant report to the police, or provide other message to the occupant in room.Such as, loudspeaker 550 Can be used to after fire or other threat being detected about the residence stayed in family or structure Live in person and report to the police to fireman or other rescuer, or can be used to occupant's notice from Open the maximum security route of family or structure.
With reference now to Fig. 6 A and Fig. 6 B, it is illustrated that the front stereogram of lens button 600 and rear vertical Body figure.Lens button 600 includes front surface 602 and rear surface 604.As shown in Figure 4 B, Lens button 600 is configured to by lens button 600 being attached to aperture 620 and by light Circle 620 is couple to the surface portion of procapsid 460 and couples with procapsid 460.Lens button 600 are configured to be pressed to provide input and/or for various to hazard detector 400 by user Other purpose, such as makes warning device quiet.Lens button 600 is further configured to for location One or more sensors after lens button 600 are transparent.Such as, a reality Executing in example, pir sensor is positioned in after lens button 600.Pir sensor can pass through Exterior object checked by lens button 600, to determine whether occupant is present in hazard detector 400 are positioned in room therein.
After the rear surface 604 of lens button 600 can have and allows to be positioned at lens button 600 The pir sensor in face or another sensor are deep into hazard detector 400 and are positioned in therein The Fresnel lens pattern 606 checked in room.In one embodiment, Fresnel lens pattern 606 multiple circles being disposed concentrically upon that the slightly different observation cone of each offer can be provided.Often The individual circle being disposed concentrically upon can provide ratio to be disposed concentrically upon and closer to lens button 600 What the circle that radially of the central axis positions was the biggest checks region or cone.In one embodiment, The interior angle of the observation cone provided by Fresnel lens pattern 606 can from about 15 ° with about Change between 150 °, in order at about 10 feet or between about 0.5m and about 8.8m Distance observation half is provided on the floor being positioned directly in before hazard detector 400 or wall Footpath.By this way, lens button 600 pir sensor below or other sensing it are positioned at Device can easily detect occupant and be present in hazard detector 400 and be positioned in room therein In.
With reference now to Fig. 6 C and Fig. 6 D, it is illustrated that can be used to make by LED or other light source The light dispersion that theres is provided so as lens button 600 below and around the aperture 620 of offer Halo effect Front stereogram and rear stereogram.Aperture 620 include main part 622 and can via this In field, known adhesive combines or any other method couples with lens button 600.And then, Aperture 620 can such as by making aperture 620 relative to the surface orientation of procapsid 460 and Radially couple with procapsid 460 by aperture 620 downwards relative to procapsid 460 so that The recess 625 of aperture 620 matches with the lug (not shown) of procapsid 460 and couples. These lugs can be fixed on the recess 625 of aperture 620 and make and procapsid 460 The adjacent aperture in surface 620 fix.Aperture 620 also include LED (not shown) or other Light source can be positioned within it to irradiate multiple second recesses 624 of aperture 620.In operation, Aperture 620 make the light dispersion that provided by LED or other light source with lens button 600 below and Halo effect is around provided.
With reference now to Fig. 6 E and Fig. 6 F, it is illustrated that can will be located into before circuit board 500 The flexible PCB of assembly (such as lens button 600) and circuit board 500 electric coupling or flexible rings The front stereogram of 640 and rear stereogram.Flexible rings 640 includes can be plugged into circuit board 500 Assembly in by lens button 600, aperture 620 and/or one or more assembly and circuit board The tail end of 500 electric couplings or ribbon 644.Flexible rings 640 also includes can including being positioned to Just the middle body of the pir sensor 650 after lens button 600.Flexible rings 640 Middle body also includes that the flange (not shown) with procapsid 460 matches to make flexible rings 640 The multiple flanges oriented relative to procapsid 460 and/or flexible rings 640 is coupled with it 646.Specifically, the passage 648 between flange 646 can be fixed on the flange of procapsid 460 So that flexible rings 640 orients and it coupled with procapsid 460 around (not shown).Soft The circumference that property circle 640 also includes making multiple LED 652 or other light source be coupled with it Circle part 642.The plurality of LED 652 is arranged to may be inserted into the recessed of aperture 620 Enter in part 624.LED 652 irradiates aperture 620 as previously described.Flexible rings What the bottom surface of the middle body of 640 included being pressed by the user along with lens button 600 and activated presses Button 651.By this way, input is supplied to dangerous inspection as previously described by user Survey device 400.
As mentioned above, embodiments of the invention (such as, hazard detector 104 and 400) Can match with online management account.Can be in the setting up procedure phase for intelligence hazard detector Between realize this pairing.The example of this setting up procedure according to the present invention is discussed in next part.
Intelligence hazard detector is arranged
Discussion to Fig. 1-6F above outlines many sensings hazard detection of the intelligent networking of the present invention Unit or intelligence many features of hazard detector and benefit.In order to realize in these benefits A bit, intelligence hazard detector may need " to match " with online management account.For this teaching The wired home device of hazard detector of such as intelligent networking, it is provided that online management account. Online management account can be with specific user, one group of specific user and/or specific house or structure phase Association.In the case of without loss of generality, online management account as described in this article will be by It is described as being associated with user.Online management account can be by selling to user or with other side The formula supply manufacturer of wired home device, retailer or other commercial entity or represent to Family is sold or otherwise supplies the manufacturer of wired home device, retailer or other business Industry entity provides, or can be by their designee, party or certain other entity There is provided.In the case of without loss of generality, online management account as described in this article will It is described as being provided by service provider.Online management account can be with the unitary class being just set The wired home device of type is strictly associated, or as an alternative can with by individually or make It is supplied to one group of wired home device of being correlated with of user (sometimes referred to as " ecological for a set of product System ") it is associated.Online management account generally includes the operation to wired home device or intelligence Can the set of required or favourable online data, metadata and the service of the ecosystem of home devices. In the case of without loss of generality, online management account as described in this article will be described as It is associated with the service provider based on cloud with " Cloud Server ", described " Cloud Server " Can be accessed by wired home device by internet, and can via their Computer Browser, Tablet PC, smart phone, wearable computing platform or other data communication equipment are by mutually Network accessed by the user.It is to be understood, however, that in the case of the scope instructed without departing from this, Online management accounts can be provided with various different embodiments, during it is functional some or Different platform entirely across the remotely-or locally position of the difference in family's outside or inside is divided Cloth.For given service provider, for the online management account of specific user usually by this The e-mail address of user uniquely identifies, but can use other unique side of name various Any one in case or custom.For given wired home device, the result of pairing process is This specific device (its can in the middle of other devices all in the world by MAC Address or other Unique identifier uniquely identifies) with the associating of the online management account of user.As noted above Arriving, this pairing is preferably so that the amount that involved user makes great efforts reduces or minimizes Mode realizes.Fig. 7 A-7I and Fig. 8 A-8U illustrates in combination for from server (such as, The calculated examples of service provider based on cloud or other computational entity), user and dangerous inspection The example of the method that the viewpoint surveying device makes intelligence hazard detector and online management account match.
Studying intensively can by the one of Cloud Server, hazard detector and the execution of calculating device be respectively Before row method, will present for registering the pairing of the first hazard detector to Cloud Server and carrying Summary for process.It has been found that setting described herein and method are such when designing There is provided well balanced in the middle of competitive target faced by during system.On the one hand, it is desirable to make Consumer's Experience Easily, robust and desirable so that they will be attracted by product and will recommend it for by Other people use and will repeat client itself.Therefore, it is desirable to make the number complexity of step, The amount of the techno-tabble used and realize installing and arranging required information technology for client The amount of (" IT ") expertise minimizes.On the other hand, enter in privacy concerns and about network The worry aspect invaded, it is desirable to provide in certification, encryption, prevention to hacker's behavior/electronic deception And the method to set up of universe network integrality aspect safe enough.Networks many for picture may The place that apratment building thing overlapping in scope is the same, it is desirable to ensure that user sets the most actually Put the hazard detector (or other wired home device) in face in front of them rather than neighbouring list Others' device in unit.It is also expected to prevent subscriber household network, the online account of user and user The unauthorized access of data.It is also expected to prevention attempts device electronic spoofing attack, prevents user network The leakage of network certificate, protection user log in key, pair code and password and guarantee device Reliability.As General Principle, also it is desirable to be used in key and other sensitive information (Wi-Fi SSID and password, the PAN network information etc.) it is stored in cloud and runs on the phone of user Wired home application in needs minimize or avoid described needs simultaneously.
The various dresses that Fig. 7 A diagram can utilize when providing and match the first hazard detector 400 Put the figure with system.In order to identify itself and with other device and security of system lead to Letter, the first hazard detector 400 can during manufacture or manufacture after during receive and store Some information.The long-time memory in the first hazard detector 400 can be stored that information in In.In certain embodiments, the first hazard detector 400 can receive cryptographic communication information, All if being used for the first hazard detector 400 and cloud service during pairing and offer process Communication between device 164 is authenticated and/or makes special purpose system key and/or the PKI card of its safety Book.In addition to encrypted message, first hazard detector 400 can also have and is stored thereon Identify the additional information of the first hazard detector 400 or will make during pairing and offer process Information.Such information can include vendor code, product code, product revision, Build date, sequence number, main 802.15.4 MAC Address, main 802.11 MAC Address, meeting Close Wi-Fi SSID and local pair code.The revision of vendor code, product code, product, Build date and/or sequence number can be used to uniquely identify the first hazard detector 400.As Being further described below, the first hazard detector 400 can participate at least two inhomogeneity The wireless network of type, i.e. can use the home Wi-Fi network 1604 of main 802.11 MAC Address And the local device network of main 802.15.4 MAC Address can be used.Junction Wi-Fi SSID (or " temporarily " Wi-Fi SSID) can be to need to set up it when the first hazard detector 400 Oneself access point and wide when time interim Wi-Fi network is provided during offer process The SSID broadcast.It is secret that local pair code can include known to the only first hazard detector 400 Confidential information.Local pair code can be used to as will be described below as in pairing With mobile computing device during offer process 816 (such as smart phone) and the first hazard detector Communication between 400 is authenticated.
In certain embodiments, information described above (that is, vendor code, product generation Code, product revision, build date, sequence number, main 802.15.4 Mac address, main 802.11 Mac Address, junction Wi-Fi SSID and/or local pair code) can be printed by being graphically encoded into Brush is in the packaging of the first hazard detector 400 or at the first hazard detector 400 itself The back side on quickly response (QR) code.By this information is encoded into QR code, energy Offer and pairing process is enough made to rationalize and become more user friendly.It is not necessary to the most defeated The information of inlet identity the first hazard detector 400, but user can simply use theirs QR code is scanned by mobile computing device 816, and therefore all information is automatically read Get in the application 814 run on mobile computing device 816.In certain embodiments, QR Code can replace with other encoding of graphs any of bar code or digital information.Note, some Embodiment can also include being printed on the first hazard detection with text formatting (ASCII such as in plain text) In the packaging of device 400, it is printed on paster and/or is printed on outside the first hazard detector 400 Some or all in this information described above on shell.There is provided below in relation to Fig. 8 I-8J Read QR code and/or manually input discussing in detail of information.
In a typical scene set, user will untie the first hazard detector 400 and Use mobile computing device 816 to initiate and pairing and offer process are provided.Mobile computing device 816 can include that laptop computer, desktop computer, smart phone, PDA, flat board calculate Machine, intelligent watch, intelligent glasses (such as, Google) and/or analog.In order to Starting this process, user can download application or can access the net provided by service provider Stand.If such account there is no, then user will also be able to use Cloud Server 164 to set Put user account.In application, user may indicate that new wired home device is added in application.? In some embodiments, the wired home device in addition to the first hazard detector 400 can be by this Same Way and system are used for matching and providing.Application 814 even needs not know about just in process This stage adds what kind of device.Such as " add it is true that user can simply choose Add new equipment " option.In other embodiments, user can specifically specify him/her Add new hazard detector.
Mobile computing device 816 can be by the home Wi-Fi network provided by router 160 1604 communicate.Router 160 can with by home Wi-Fi network 1604 and internet 1602 The gateway connected or modem combination.Application 814 can be mounted with or be updated to know The internet address of road Cloud Server 164.Mobile computing device 816 then can be by interconnection Net 1602 communicates with Cloud Server 164, and asks for pairing and provide new intelligence The information of home devices (such as the first hazard detector 400).
In response to this request, Cloud Server 164 can provide to mobile computing device 816 and be used for Match and provide the configuration information of the first hazard detector 400.Configuration information can be used to Make the user account pairing of the first hazard detector 400 and Cloud Server 164 and make first Hazard detector 400 can set up/add the local device that can include other wired home device Network.Configuration information can include many different types of data, such as during pairing process Service node ID as the identifier of the first hazard detector 400.Configuration information can also wrap Include the user's account that can identify user's account on Cloud Server 164 uniquely and/or globally Family identifier.Configuration information can also include that mark will be " phoning family " with in pairing The interconnection entoilage of the first hazard detector 400 used when contacting Cloud Server 164 during process The DNS host name of location.As will be described below, can also include can be by for configuration information It is used for making the first dangerous inspection when the first hazard detector 400 initially contacts Cloud Server 164 Survey the account pairing token of device 400 and the user account pairing of Cloud Server 164.The account joins Can include token using the cryptographic key or the double secret key that are stored by Cloud Server 164 to encrypt Opaque token so that Cloud Server 164 can be to the first hazard detector when being contacted 400 are authenticated.Configuration information can also include allowing the first hazard detector 402 to set up/add Enter the local device network configuration information of local device network (such as 802.15.4 network).
Note as it has been described above, the configuration information sent from Cloud Server 164 is dangerous with by first Detector 400 during manufacture or after manufacturing during store and by the information of QR code coding Overlapping.These data are separated between Cloud Server 164 and the first hazard detector 400, To make network security and providing the competitive target of desirable Consumer's Experience as described above to put down Weighing apparatus.As possible required, other embodiments can be with memory overlay information.
In addition to from Cloud Server 164 download configuration information, mobile computing device 816 can refer to Show that user unties the first hazard detector 400 and is scanned RQ code.At QR code Can not be scanned by mobile computing device 816 and (sweep with such as, using smart phone camera optics Retouch) in the case of, will be prompted to user will such as local pair code, device sequence number and/or class It is input to apply in 814 like the information of thing.Below the user interface describing this process is carried out More detailed description.In certain embodiments, will refer at least to show that user inputs the first hazard detection The local pair code of the device 400 or information of local pair code can be obtained from it.
How Fig. 7 B diagram can be activated according to the first hazard detector 400 of some embodiments And it is used for generating interim Wi-Fi network 798.Scanning and/or manually inputting by first After the information that the QR code of hazard detector 400 and/or label/packaging are provided, apply 814 May indicate that user activates the first hazard detector 400.Can be by the first hazard detector 400 provide user's input to realize activating.In one embodiment, user input can include by Button in first hazard detector 400.Other embodiments can include voice command, from electricity Cabin, pond removes protection lug to provide electric power to the first hazard detector 400, make the first danger Danger detector 400 is fixed to installing plate, the first hazard detector 402 is connected to home electrical System and/or analog.After the activation, the first hazard detector 400 can be started and carried out Various initialization routines.As will be described below in more detail, the first hazard detector 400 Can provide and let the user know that audio frequency that the first hazard detector 400 has been activated and/or vision refer to Show symbol.Such as, the first hazard detector can include lamp and/or oral instruction (such as, " you Good ").
After the start-up procedure or period, the first hazard detector 400 can set up local Wi-Fi Access point and start to broadcast interim Wi-Fi network 798.First hazard detector 400 is in pairing With SSID or the password that this stage of the process of offer does not knows home Wi-Fi network 1604.Replace In generation, requires that mobile computing device 816 is manually inserted in the first hazard detector 400 by user, First hazard detector 400 can generate and can be detected by mobile computing device 816 and be connected to Interim Wi-Fi network 798.In certain embodiments, QR code is scanned to shifting The dynamic device 816 that calculates provides interim (junction) just broadcasted by the first hazard detector 400 Wi-Fi SSID.Then application 814 can be automatically switched to from home Wi-Fi network 1604 Interim Wi-Fi network 798.At the end of offer process, network can be connected by application 814 to be cut Gain the home Wi-Fi network 1604 of mobile computing device 816, and without user's notice and/ Or input.In other embodiments, application 814 is capable of informing a user that they need theirs Network connection is manually switched to interim Wi-Fi network 798.Because QR code includes temporarily Wi-Fi SSID, so application 814 can show that what mobile computing device 816 should be connected to faces Time Wi-Fi network 798 title, such as " NEST-22356 ".Then user can navigate to The setting of mobile computing device 816 and be switched to interim Wi-Fi network 798.
How Fig. 7 C diagram can provide according to the mobile computing device 816 of some embodiments will be First hazard detector 400 of operation on home Wi-Fi network 1604.By the first hazard detection The interim Wi-Fi network 798 (i.e. local Wi-Fi Hotspot) that device 400 creates is probably dangerous So that mobile computing device 816 can be interim without adding in the case of providing password Wi-Fi network 798.In order to provide safety in the case of not requiring user to input troublesome password Communication, it is possible to use local pair code.Application 814 can use local pair code to make With the interim Wi-Fi network secure session of the first hazard detector 400, described local pair code Be by QR code be supplied to mobile computing device 816 or from the first hazard detector 400 Printed label manually input.By via interim Wi-Fi network 798 by pair code (or Person can obtain the information of this pair code from it) it is sent to first from mobile computing device 816 Hazard detector 400, the first hazard detector 400 will be appreciated by there is calculating dress that is correct and that authorize Put.In certain embodiments, this can create the session of cipher authentication.By using pairing generation Code, it is provided that process is protected from multiple hazard detector and is installed (all the most close proximity to each other If morning on Christmas is in apratment building thing) scene.
After setting up communication session by interim Wi-Fi network 798, mobile computing device 816 The configuration information received from Cloud Server 164 can be sent to the first hazard detector 400.Return Think configuration information include to be used by the first hazard detector 400 in case with Cloud Server 164 User account pairing data.Configuration information also includes can be by the first hazard detector 400 Set up or add the data required for the compatible local device network of 802.15.4.
In order to provide the first hazard detector 400 on home Wi-Fi network 1604, it may Need to be provided with the network SSID of this home Wi-Fi network and password (if being suitable for).? In some embodiments, application 814 can store home Wi-Fi network SSID and password and from Provide this information to the first hazard detector 400 dynamicly.But, home Wi-Fi network SSID It is not typically safer by application 814 storage with password.Alternatively, application 814 can be ask Ask that user selects home Wi-Fi network SSID from the list of available Wi-Fi network.If desired The password (such as, WEP/WPA password) that user inputs them can also be pointed out.Then can By interim Wi-Fi network 798, this information is sent to the first hazard detector from application 814 400.After sending, application 814 can delete SSID and password so that they are not answered With for good and all storing.Noting in these embodiments, application 816 or Cloud Server 164 are the most not The certificate of home Wi-Fi network 1604 must be stored.So, compromise application 814 and/or cloud service Device 164 will not give assailant the access to the home Wi-Fi network 1604 of user.
How Fig. 7 D diagram can pass through house according to the first hazard detector 400 of some embodiments Front yard Wi-Fi network 1604 makes itself match with Cloud Server 164.At this moment, first is dangerous Detector 400 can use the SSID received from mobile computing device 816 and password to be connected to Therefore home Wi-Fi network 1604 and router 160 also obtain the access to internet 1602. Then first hazard detector 400 can use the internet address of mark Cloud Server 164 DNS host name is connected with Cloud Server 164.First hazard detector 400 can also provide The service node ID of itself is identified based on the raw requests from mobile computing device 816. DSN host name and service node ID are included in and pass to calculate dress from Cloud Server 164 Put 816 and then in the configuration information of the first hazard detector 400.
In order to itself being authenticated to Cloud Server 164, the first hazard detector 400 energy It is stored in the first hazard detector 400 during after enough using during manufacture or manufacturing PKI certificate and/or special purpose system key.It is logical that this can generate safety based on certified certificate Letter session.In certain embodiments, the method based on PKI of session authentication may look like mark Quasi-SSL/TSL.
After setting up certified communication session with Cloud Server 164, the first hazard detector Account ID and the account pairing token of in the future self-configuring information can be sent to Cloud Server 164. Service is able to verify that account pairing token is to determine that the first hazard detector 400 is mobile computing dress Put 816 and make the device that raw requests is targeted.Access to your account ID, and Cloud Server 164 is then The first hazard detector 400 can be made to match with corresponding user account.At this moment, account is joined To completing, and the first hazard detector 400 has been provided at home Wi-Fi network 1604 Upper operation.
After terminating offer process, mobile computing device 816 can be from interim Wi-Fi network 798 Disconnect and reconnect to home Wi-Fi network 1604.Some embodiments can automatically be entered This connection of row, but other embodiments may require user by changing their mobile computing Arranging on device 816 is manually reverted to home Wi-Fi network 1604.It is currently capable of leading to Cross home Wi-Fi network 1604 and realize setting any follow-up of the first hazard detector 400 Configuration.Such as, user can select the position in the shell 150 of the first hazard detector 400, Such as bedroom, kitchen, entrance hall etc..User can also select/make it possible to realization to make the first dangerous inspection Survey device 400 " street lamp " feature as night-light operation when detecting that the mankind are present in dark. Will be described in greater detail below these and additional retouching in detail of feature (including user interface) is set State.But, it now is possible to by home Wi-Fi network 1604 or by internet 162 Realize each in these additional setting up procedure.When being communicated by internet, arrange To be received by mobile computing device 816 and be sent to Cloud Server 164.Then, Cloud Server Setting will be sent to the first hazard detector 400 by internet 1602 by 164.Show at one In example embodiment, mobile computing device 816 will be performed by Cloud Server 164 exclusively Communicate with the future between the first hazard detector 400.
Fig. 7 E diagram according to some embodiments be used for set up wired home hazard detector with The flow chart of the method for the pairing between the online management account set up at central server.The party Method lists the subset above for the step described by Fig. 7 A-7D.But, various embodiments Can add or remove any one in feature described above and not limit.The method Can be included at mobile computing device and make the configuration for hazard detector and control design Application example (702).Application can be communicated with central server foundation by internet.Should Method is additionally may included at mobile computing device and receives first code (704) from central server. First code can include account pairing token, and can be in response to for being added by new equipment It is received to user account.
The method can also include receiving the letter that the printing surface being associated with hazard detector obtains Breath (706).Printing surface can be printed on hazard detector itself or arrange Position is physically with in document printing, paster and/or the packaging of hazard detector.From printing The information that surface obtains can include second code.Second code can include described above Local pair code.The method can also include being broadcasted Wi-Fi access point by hazard detector SSID.It is made to broadcast the use of interim Wi-Fi network as it has been described above, hazard detector is able to receive that Family inputs.The method can additionally include and receive access from user at mobile computing device The selection (710) of some SSID.User can select interim Wi-Fi network and examine with danger Survey device and set up corresponding Wi-Fi connection.In order to mobile computing device is authenticated, mobile computing Second code (such as, local pair code) can be sent by device by interim Wi-Fi network To hazard detector.
The method be additionally may included at mobile computing device receive hazard detector will be for accessing The identity (712) of the home Wi-Fi network of internet.User can input/select their family The SSID of front yard Wi-Fi network and/or password, described SSID and/or password then can be by facing Time Wi-Fi network be sent to hazard detector.Therefore, the method can additionally include from shifting The dynamic device that calculates sends first code and the identity of home Wi-Fi network to hazard detector (714).Then hazard detector can use the identity of home Wi-Fi network to be connected to mutually Networking.Then the method can include using home Wi-Fi network in central server and dangerous inspection Survey to set up between device and connect (716).After setting up this connection, the method can also include by Hazard detector sends to central server and includes first code (such as, account pairing token) Transmission (718).This transmission can be used by central server and be previously stored in danger during fabrication Information in the memory of danger detector is authenticated.It is stored in dangerous inspection for instance, it is possible to use Survey the PKI certificate in device and/or transmission is authenticated by private key.The method can additionally include Make hazard detector and user account pairing (720).Can verify by using second code The matching relationship pre-build is to realize this pairing.For instance, it is possible to comparison is initially sent to move The dynamic account pairing token calculating device verifies the account pairing order received by central server Board.Can also be by making hazard detector and the account of user account (such as unique account Family ID) being associated realizes account pairing.
Comprise by mobile computing device the 816, first danger about previously describing in detail of Fig. 7 A-7E Operation performed by danger detector 400 and/or Cloud Server 164.The disclosure now by continue into Retouching in detail of the single method that row can be performed by each in these single device/system State.Detailed description subsequently also can be used to perform the exemplary of various method step by including User interface.
Fig. 7 F diagram according to embodiment performed by server in case set up hazard detector with The method 700 of the pairing between wire management account.In certain embodiments, method 700 can be by For not including the Intelligence home environment of the hazard detector of one or more networking.Below Each step of method 700 discussed in detail, and with reference to providing and the step of method 700 Some steps are discussed by the appended drawings of the most relevant physics diagram.
At step 705 place of method 700, central server or cloud computing system (such as, cloud Server 164 (figure 1 illustrates)) input corresponding with code can be received.More specifically, Input can be from Cloud Server request code to make new hazard detector match with user account. The code of this request can be the account pairing token for hazard detector.Code is all right It is associated with the additional information being stored on Cloud Server.
At step 707 place of method 700, central server or cloud computing system (such as, cloud Server 164) can receive with for accessing the input that the certificate of online management account is corresponding.Example As, hazard detector can be sent in the certificate of wire management account to Cloud Server 164, described Certificate may the most be stored in hazard detector during manufacture process.These certificates The information being associated with PKI certificate and/or private key can be included.Then can be via being connected to mutually The certificate of online management account is supplied to Cloud Server 164 by the home Wi-Fi network of networking.Can Online with uniquely identified by e-mail address (such as, the e-mail address of user) Account executive can allow user to access online service (such as, service 204 (figure 2 illustrates)) Or it is otherwise benefit from described online service.By electricity during initial online account is set up Sub-addresses of items of mail is used as account (or needed for additionally as online account creation process A part) it is advantageously provided for guaranteeing online name on account uniqueness for service provider Mode, and access their Email with from service provider described range request user excessively Retrieval also provides for certain journey when verifying message and respond checking message via e-mail The safety of degree.
At step 709 place of method 700, central server or cloud computing system (such as, cloud Server 164) code (such as, account pairing token 832) and online management can be used The certificate of account makes hazard detector be associated with online management account.This can also allow for number It is collected, stores and is linked to use according to (such as, family data 202 (figure 2 illustrates)) The online management account at family and/or can be with the online management account access of user.Additionally, this pass Connection can allow the first hazard detector 400 via the remote access of the online management account of user And/or long-range or distributed AC servo system.
At step 711 place of method 700, Cloud Server 164 can receive and the first dangerous inspection Survey the input that the position of device 400 is corresponding.Information can be stored in the online management account of user At family and for strengthening the feature of the service 204 being supplied to the first hazard detector 400.Position Confidence breath can be utilized to configure the first hazard detector 400 further, such as to depend on it The type in the room being located therein and apply different warnings in advance " to remind " setting.Such as, The position of the first hazard detector 400 can be used to change alarm and be provided to user and/or the One hazard detector 400 how to explain by its sensor measurement to the mode of characteristic.More specifically Ground, if the first hazard detector 400 is installed in kitchen, then can reduce cigarette detection spirit Sensitivity (such as, low-level cigarette is probably normally in kitchen) and/or can change Alarm or warning order are (for example, it is possible to provide a user with more chance with for known safety Plume part gain the initiative by striking first " making " alarm " solemnly silent ").
Danger can be made in step 713 place of method 700, central server or cloud computing system Detector is associated with the position selected in step 711 place.Therefore, creating in step 709 place In the association built, step 713 can be come according to selected position with online management account One hazard detector 400 is classified.This can allow to service 204 and be explained further in family The data received at data 202 and the position providing the user with consideration the first hazard detector 400 The analysis put.Additionally, this association can allow user distinguish by name hazard detector and Manage the most discretely with single online management account.
Fig. 7 G-1 and Fig. 7 G-2 illustrates being performed to set up the first danger according to embodiment by user The method 730 of the pairing between danger detector 400 and online management account.It is similar with method 700, Method 730 can be used for the most not including the intelligent family of the hazard detector of one or more networking Front yard environment.Each step of method 730 discussed in detail below, and with reference to providing The appended drawings (such as, Fig. 8 A-T) of the physics diagram relevant with the step of method 730 is to some Step is discussed.
In certain embodiments, method 730 can include optional step as method 730 (as Indicated by the dotted line in Fig. 7 G-1) step 732 and 734.Optional step in method 730 At rapid 732, user may determine that how to depend on whether user has for management the first danger The online management account of detector 400 and/or other intelligent apparatus and proceed.If user Do not have online management account, then user can proceed to create at optional step 734 Wire management account.If user has had online management account, then user can directly be carried out Step 736, thus walk around optional step 734.User may have online management account, Because user has needs other intelligent apparatus of online management account or because user previously recognized Know the benefit to the online management account for management the first hazard detector 400.
At optional step 734, user can create online management account.Can be configured Become and communicate with the server (such as, Cloud Server 164) for trustship online management account Application (such as, such as application 814 discussed below) or webpage at create online management account Family.Such as, user can access webpage at desktop computer or access at smart phone Application is to create online management account.As mentioned above, online management account can be led to Cross e-mail address (such as, the e-mail address of user) to uniquely identify and allow User accesses online service (such as, service 204 (figure 2 illustrates)) or with other side Formula benefits from described online service.
At step 736 place of method 730, user can be from the product of the first hazard detector 400 Product packaging unties the first hazard detector 400.Fig. 8 A and Fig. 8 B illustrates according to embodiment The example of the physical process being associated with step 736.First, the first hazard detector 400 can To remove in packing from its product.As shown in Figure 8 A, can be by making the top of box 800 Portion 800a and bottom 800b separately thus exposes the first hazard detector 400 to realize this. Then, as seen in fig. 8b, can be together with other content of box 800 from box 800 In remove the first hazard detector 400.Other content of box 800 can include installing plate 802 (such as, the installing plate 410 of Fig. 4 A), for installing plate 802 is attached to family safely Or the securing member 804 of the wall of other structure or ceiling and hazard detector information block 806. Information block 806 can include for user installation and/or open application or access webpage so that The instruction of Cloud Server 164 is accessed via internet 162.User is it may be necessary to pull out battery Lug is to expose battery (such as, the battery of battery pack 450 (illustrating in Figure 4 A)) Terminal, and provide power for operation or non-firm power to the first hazard detector 400.
As seen in fig. 8 c, the first hazard detector 400 and installing plate 802 can include correspondence Feature so that when user twists the first hazard detector 400 on direction 808, first endangers Danger detector 400 becomes to be locked on installing plate 802.When sensor determines the first dangerous inspection Survey device 400 installed on installing plate 802 time, the first hazard detector 400 can also be wrapped Include and make the first hazard detector 400 " startup " or initiate circuit and the sensor of its operating system. The advantage of the detection sensor that these are installed can be the setting for the first hazard detector 400 Process may be until its installed (example in may having been installed within family or other structure As, on wall or ceiling) just start.Therefore, setting up procedure can consider specified conditions, Environment and/or be provided with the position of the first hazard detector 400.Such as, in the setting up procedure phase Between, the first hazard detector 400 can provide strong based on which network to the position that it is installed Signal and be connected to network and/or with family or other structure the first hazard detection is installed The particular room of device 400 is associated.Describe in detail the network of hazard detector in this article The benefit connected and make hazard detector be associated with the ad-hoc location in family or other structure Place.
In another embodiment, even if the first hazard detector 400 is not yet installed in installing plate On 802, the setting up procedure of the first hazard detector 400 can also be after battery lug be drawn out Immediately begin to.By this way, the first hazard detector 400 still can be positioned alternatively For the rearmost position operated when battery lug is drawn out close to it, fill it is not required that install Put so that setting up procedure starts.(such as, prefer installing the user in some cases Not to utilizing the first danger in the case of arranging it before one hazard detector 400 and/or user In the case of the feature of detector 400 location-based and/or networking is interested) this is flexible Property is probably favourable.
As seen in fig. 8d, the first hazard detector 400 can generate music to indicate it Guiding, such as, hazard detector can generate music as an alternative via loudspeaker 550, and first Hazard detector 400 can generate any kind of sound (such as, tone and voice) and/or Visual indicator (such as, LED 652 can produce light according to predetermined pattern).
After the first hazard detector 400 has been turned on, it can generate audio frequency and/visually indicate Accord with and receive input via button 600, in order to permitting a user to the first hazard detector 400 Operation and select language preference.Such as, the first hazard detector 400 can be used audibly English says " Press the button now for English ", put into words " Pulse el with Spanish Boton ahora para Espanol " etc..(can such as pass through online app, by spoken own Intrinsic order and/or by information block 806) at them, instruction user hears that they are said Language time provide user to input to the first hazard detector 400.Such as, the user spoken English Phrase " the Press the button noticed by the first hazard detector 400 can be heard at them Now for English " time press the button in the first hazard detector 400.Preferably, phase is used The language answered proceeds each order, using the teaching of the invention it is possible to provide desirable greeting (such as, English above Language phrase will be " Hello from Nest [or Business Name], press the button now for English.”).Preferably, desirable light shows (such as blue glow, or seem have rotation figure The blue glow of case) send from halo optical element 620 during hello and speech selection process, this It is considered to cause desirable affirmative when user teaches confidence to proceed together with spoken words Sensation.User can press the button 600, to open on the direction 810 gone out as seen in fig. 8e Begin to communicate with the first hazard detector 400.As an alternative, user can use voice command Start to communicate with the first hazard detector 400.As seen in fig. 8f, as response, First hazard detector 400 can generate audio frequency and/or visual indicator.Such as, first is dangerous Detector 400 can tell user's " device ready!Again by once testing." pressing the button 600 so that during test case, and voice is it may be said that " This is only a test.The alarm will sound.The alarm is loud.The test starts in 10 seconds.Press or wave to Cancel.10,9,8,7 ... (this is only test.Report to the police sounding.Report to the police and ring.Test is 10 Start in second.Press or wave to cancel.10、9、8、7、…)”.If the user while pass Subtract before counting reaches zero and do not press the button or send " gesture solemn silence " or " waving with solemn silence " Order, then test will proceed, and wherein, " This is only a test.Testing said in voice Smoke (this is only test, is testing cigarette) ", the actual cigarette being followed by reaching several seconds is reported to the police Buzzing, is then followed by " Testing carbon monoxide (testing carbon monoxide) ", Then it is followed by reaching the actual carbonic oxide alarming buzzing of several seconds, is then followed by " The test is (test completes finished.Everything is OK.All go well) ".For an embodiment, The brewed blue glow of blue glow or halo light with spoken voice until test warning buzzing is Only, at this moment halo light glows or brewed ruddiness.After test warning buzzing, along with language Sound is said " Everything is OK (all going well) ", and halo light sends green aura or Modulating green aura, this forces hazard detector to test ensureing again of OK.
Then the audio frequency and/or the visual indicator that are similarly provided by the first hazard detector 400 may be used By guide or instruction user their smart phone or flat board or other have in terms of similar capabilities Calculating and open app or webpage on device, this will promote carrying of code in the middle of function favourable at other Supply.During the various further parts arranged, the first hazard detector 400 can generate pulse Blue light line 812.
In step 738 place, user can access Cloud Server 164 via internet 162.Example As, user can follow the instruction being included in information block 806, and on the computing device Install and/or open hazard detector management application (such as, application 814) or calculating dress Put access webpage, in order to communicate with Cloud Server 164 via internet 162.Application Or webpage may require user and inputs for the card accessing online management account at application or webpage Book (such as, username and password).
In step 740 place, user may determine that how to depend on whether user has for managing First hazard detector 400 and/or the online management account of other intelligent apparatus and proceed. If user does not have online management account, then user can proceed to create in step 742 place It build wire management account in.If user has had online management account, then user can continue Carry out step 744.As mentioned above, user may have online management account, because of Have other intelligent apparatus needing online management account for user, user previously recognized for Manage benefit or other reason of the online management account of the first hazard detector 400.
In step 742 place, user can create online management account.Can be configured to Application (the example communicated for the server (such as, Cloud Server 164) of trustship online management account As, apply 814) or webpage at create online management account.Such as, user can be at desk-top meter Access webpage at calculation machine or at smart phone, access application to create online management account. As mentioned above, online management account can pass through e-mail address (such as, user E-mail address) uniquely identify and allow user access online service (such as, clothes Business 204 (figure 2 illustrates)) or it is otherwise benefit from described online service.
In step 744 place, user can access online management account.User can be in step 744 Place is by providing and being used for being configured to the application that communicates with Cloud Server 164 (such as, Application) or webpage at access the corresponding input of certificate of online management account and access online pipe Reason account.As an alternative, online management account certificate may be previously stored on the computing device Application on and can work as calculate device (such as, mobile computing device 816) place open should Used time is sent to Cloud Server 164.These certificates may they previously the time application When place is transfused to (such as, after being initially opened application or start above step 736 it Front certain is At All Other Times) stored.In certain embodiments, can be in the first hazard detection Hold (that is, after step 752) after the code of device 400 is provided to Cloud Server 164 This step of row.
In step 746 place, user the first hazard detector 400 can be installed to family or its The wall of its structure or ceiling.User can be in response to also according to being configured to and Cloud Server The instruction that theres is provided at 164 application communicated or webpage or at information block 806 and perform Step 746.As discussed above, the first hazard detector 400 and installing plate 802 are (at figure Shown in 8C) characteristic of correspondence can be included so that when user twists first on direction 808 During hazard detector 400, the first hazard detector 400 becomes to be locked on installing plate 802, As seen in fig. 8 c.When sensor determines that the first hazard detector 400 is installed at installing plate Time on 802, the first hazard detector 400 can also include making the first hazard detector 400 " open Dynamic " or initiate circuit and the sensor of its operating system.The detection sensor that these are installed Advantage can be that the setting up procedure for the first hazard detector 400 may be until it be installed In may having been installed within family or other structure (such as, on wall or ceiling) Start.Therefore, setting up procedure can consider specified conditions/environment/be provided with the first hazard detection The position of device 400.Such as, during setting up procedure, the first hazard detector 400 can be with base In which network strong signal is provided to position that it is installed and be connected to network and/or with family The particular room being provided with the first hazard detector 400 of front yard or other structure is associated.At this Literary composition describe in detail the network of hazard detector connect and make hazard detector and family or The benefit that ad-hoc location in other structure is associated.
In another embodiment, even if the first hazard detector 400 is not yet installed in installing plate On 802, the setting up procedure of the first hazard detector 400 can also be after battery lug be drawn out Immediately begin to.As discussed above, user is it may be necessary to pull-out battery lug is to expose The terminal of battery (such as, the battery of battery pack 450 (illustrating in Figure 4 A)), and to First hazard detector 400 provides power for operation or non-firm power.In this embodiment, One hazard detector 400 still can be positioned as being drawn close to it at battery lug alternatively The rearmost position of operation when going out, it is not required that erecting device is so that setting up procedure starts.One (such as, prefer to arrange before the first hazard detector 400 is installed user under a little situations In the case of it and/or user not to utilize the location-based of the first hazard detector 400 and/ Or in the case of the feature of networking is interested) this flexibility is probably favourable.
At step 748 place of method 730, as shown in Fig. 7 G-2, user can press danger Button on detector 400.User can as shown in Fig. 8 E in direction 810 Press the button 600 (illustrating in fig. 6), to start to communicate with hazard detector 400. As an alternative, user can use voice command to start with hazard detector 400 to communicate. As response, as seen in fig. 8f, hazard detector 400 can generate audio frequency and/or vision refers to Show symbol.Such as, the first hazard detector 400 can tell user's " device ready!Again by one Secondary test." the first hazard detector 400 can also generate pulsed blue line 812.These audio frequency And/or visual indicator can guide or indicate user to open app or webpage at calculating device So as offer code.First hazard detector 400 can also generate audio frequency and/visual indicator also And receive input via button 600, in order to permit a user to the behaviour of the first hazard detector 400 Elect language preference.
In step 750 place, it is dangerous that user may indicate that app or application 814 begin for first The setting of detector 400.Fig. 8 G illustrates the ability to be configured to provide the user with for setting up procedure The app of instruction of following step or application 814 (or, such as, webpage).Such as, Application 814 can be opened on device (such as, mobile computing device 816) calculating, and Screen 818 provides a mean for the following step of setting up procedure to guide the interface of user. More specifically, Fig. 8 G illustrates that application 814 can notify user " device transmits in its lamp pulse Time blue ready " and " it will tell that you are ready ".Therefore, user can be dangerous first Detector 400 is with pulse transmission blue light line 812 and generates following voice: after " ready " Select " starting setting up " button 820.Mobile computing device not yet it is installed in application 814 Under some situations on 816, the first hazard detector 400 can use audio frequency (such as, voice) And/or visual indicator indicates user to download and install application 814 practically.Select " to start Arranging " button 820 brings the interface of the application 814 shown in Fig. 8 H, and described interface indicates User provides unique code for the first hazard detector 400.
In step 752 place, user can input the first hazard detector 400 at application 814 Code.This code can be unique ID of the first hazard detector 400.This code is all right (date that such as, the first hazard detector 400 is manufactured, initially installed with additional information Software version in the first hazard detector 400 and/or about the first hazard detector 400 Out of Memory) it is associated.In order to perform step 752, user may need first to determine the first danger The code of danger detector 400.This code can be contained in the product of the first hazard detector 400 In product packaging or display is in hazard detector, and via being configured to Cloud Server 164 The app communicated or webpage is provided to be supplied to Cloud Server 164.
User by manually input in field 822 alphanumeric code and at the end of select Select " completing " button 824 to perform step 752.As an alternative, user can select scan button 826 to bring the interface of the application 814 shown in Fig. 8 I.This interface can be used for QR Code is scanned.Can paster on the backboard 420 being positioned at the first hazard detector 400 QR code and alphanumeric code is found on 828.As shown in Fig. 8 I, application 814 entrance Camera mode interface is to allow user's shooting to be positioned on paster 828 and by alphanumeric generation The picture of the QR code 830 of code 832.QR code can be processed by application 814, with Just determine alphanumeric code the 832, first hazard detector 400 another unique ID or about The out of Memory of the first hazard detector 400.Application 814 can be immediately following to QR code 830 Scanning after alphanumeric code 832 be automatically entered into field 832 (show in Fig. 8 J Go out) in.
Fig. 8 J is shown input into the alphanumeric code 832 in field 822.Again, Ke Yitong Cross and alphanumeric code 832 is manually input in field 822 or by QR code 830 (shown in Fig. 8 I) are scanned and allow to apply 814 to determine alphanumeric code 832 and be automatically entered in field 822 and realize this.Then user can press Button 824, in order to alphanumeric code 832 is sent to Cloud Server 164.
Cloud Server 164 can use code (such as, account pairing token and for online The certificate (the PKI certificate such as, being stored in the first hazard detector and private key) of management) Make the first hazard detector 400 and online management account system.This can also allow for data (such as, family data 202 (figure 2 illustrates)) is collected, stores and be linked to user Online management account and/or can be by the online management account access of user.Additionally, this pass Connection can allow the first hazard detector 400 via the remote access of the online management account of user And/or long-range or distributed AC servo system.But, for allowing the Data Collection of the first hazard detector 400 And/or remotely control to be possibly realized, the first hazard detector 400 may need have network and connect.
In step 754 place, the first hazard detector 400 is connected to network by user.Fig. 8 K-P Illustrate and (such as, hazard detector (such as, the first hazard detector 400) is connected to network Internet 162 (figure 1 illustrates)) example of physical process that is associated.First, such as figure Shown in 8K, can at the application 814 on mobile computing device 816 offer interface to carry For the instruction for the first hazard detector 400 being connected to internet 162.Such as, instruction Can include for the first hazard detector 400 is connected to internet 162 and continuing with Three steps of the setting up procedure of the first hazard detector 400: (1) is opened and arranged app, (2) Under Wi-Fi, it is connected to be referred to as the network of " Device-659F38 ", and (3) return to Application 814 is to complete to arrange the first hazard detector 400.Some in these steps may be specific In mobile computing device 816, described mobile computing device 816 can be in certain embodiments IPhone, but device (such as, other smart phone, flat board, knee can be calculated for other Laptop, notebook and Integral computer) take similar step, in order to by them even The casual network being created by the first hazard detector 400 or being provided is provided.
" Device-659F38 " network can be in the setting up procedure phase by the first hazard detector 400 Between provide interim Wi-Fi network.As an alternative, the first hazard detector 400 can provide and be used for Use other wireless protocols (any one in other wireless protocols such as, mentioned herein) Come with calculate device (such as, mobile computing device 816) communicate one or more other Network.This casual network can provide for being not attached to mutually in the first hazard detector 400 The first hazard detector 400 is allowed to lead to mobile computing device 816 while networking 162 The most initial means of letter.
According to the instruction shown in Fig. 8 K, user can close application 814 and open setting Application 834 or otherwise switching application are to open and arranging application 834 and check and set Put the Wi-Fi configuration interface of application 834, as shown in Fig. 8 L.Then, user can by Arrange in the list of the network detected shown by app 834 by rapping " Device-659F38 " selects " Device-659F38 ".As shown in Fig. 8 L, application is set The Wi-Fi configuration interface of 834 is that user can complete by application 814 display in Fig. 8 K The example of the content seen after the step (1) of instruction and step (2).In step (3) place, User may return to apply 814 to complete to arrange the first hazard detector 400, therefore applies 814 can show the picture shown in Fig. 8 M.This picture provides mobile computing device 816 even Receive the confirmation of the first hazard detector 400.First hazard detector 400 can also generate sound Frequency and/or visual indicator notify user's mobile computing device 816 and the first hazard detector 400 the most successfully connect.Such as, as shown in Fig. 8 M, below hazard detector can generate Voice: " device is connected to app!”.As an alternative, the first hazard detector 400 can generate Other audio frequency being successfully connected and/or visual confirmation.In order to continue setting up procedure, user can select Select " continuation " button 836.
Fig. 8 L diagram user how can from their home Wi-Fi network be manually switched to by The interim Wi-Fi network that first hazard detector 400 is generated.In other embodiments, application 814 can be automatically switched to interim Wi-Fi network, and without any input from user. When reading QR code, mobile computing device 816 can read by the first hazard detector 402 It is used for generating the junction Wi-Fi SSID of interim Wi-Fi network.After there is this information, should Interim Wi-Fi network can be automatically attached to 814.
Fig. 8 N illustrates the network settings interface of application 814.At this moment, application 814 instruction users from The Wi-Fi detected by mobile computing device 816 and generated with tabular form by application 814 The list 837 of network selects the main home network of user.This allows user to select the first danger Detector 400 can make the network for being connected to internet 162, such as, " OurHuse " net Network.When being selected network by user, " input password " interface can be shown by application 814, As shown in Fig. 8 O, wherein, user can input in field 838 be used for being connected to selected The password of network.Under home Wi-Fi network unsafe condition, can skip for inputting This step of password.These certificates can be sent to the first hazard detector 400 by application 814, Allow it to obtain the access to internet 162 via the router of selected network.
Application 814 can show the picture shown in Fig. 8 P, in order to provides a user with first dangerous (such as, detector 400 is connected to local network (such as, via website nest.com) " OurHouse "), internet 162 and the confirmation of Cloud Server 164.First hazard detection Device 400 can also generate audio frequency and/or the visual indicator of correspondence.Such as, as shown in figure 8p, Hazard detector can generate following voice: " device is connected to nest.com!”.As an alternative, First hazard detector 400 can generate other audio frequency and/or visual confirmation being successfully connected.This A little confirmations show that the first hazard detector 400 is associated and user with online management account Being able to access that or be otherwise benefit from servicing 204, such as, user can use computer (such as, desktop computer, laptop computer or flat board) or other portable electron device (such as, smart phone 166) communicate with the first hazard detector 400.As it has been described above, First hazard detector 400 is currently capable of directly having communicated to join with Cloud Server 164 To process.
At step 756 place of method 730, it is dangerous that user can input first at application 814 The position of detector 400.Information can be stored at the online management account of user and use Strengthen the feature of the service 204 being supplied to the first hazard detector 400.Positional information is permissible Even it is used to configure the first hazard detector 400 further.Such as, the first hazard detector The position of 400 can be used to change alarm and be provided to user and/or the first hazard detector 400 how to explain by its sensor measurement to the mode of characteristic.If more specifically, the first danger Danger detector 400 is installed in kitchen, then can reduce cigarette detection sensitivity and (such as, exist In kitchen, low-level cigarette is probably normally so that can increase the alarm threshold value of cigarette) and/ Or alarm or warning order can be changed (for example, it is possible to provide a user with more chance with pin Known safe plume part is gained the initiative by striking first " making " alarm " solemnly silent ").
The example of the physical process that Fig. 8 Q diagram is associated with step 756.As shown in Fig. 8 Q, Can at the application 814 on mobile computing device 816 offer interface to allow user to select the The position of one hazard detector 400.User can perform slip gesture to list object 840, So that the list scroll-up/down in the room being included in list object 840 and by room Put in selection field 842 for one.When desired room occurs in selection field 842, User can select button 844 to confirm that room selects.As shown in Fig. 8 Q, list pair As 840 include following selectable room: living room, master bedroom, child bedroom, guest Bedroom and dining room.In certain embodiments, list object 840 can also include different and/or attached The optional room added, such as, other room, house, office building room, garage or work Dynamic room, house.As an alternative, apply 814 can simply provide user to be able to manually enter First hazard detector 400 is installed in room title or the first dangerous inspection of position therein Survey the field (such as, field 838, as shown in Fig. 8 O) of another title of device 400.
Cloud Server 164 can make the first hazard detector 400 and in the selection of step 756 place Position is associated.Therefore, in the association created in step 752 place, step 756 is all right First hazard detector 400 is classified according to selected position with online management account. This can allow to service 204 (figure 2 illustrates) be explained further family data 202 ( Shown in Fig. 2) data that receive and provide the user with and consider the first hazard detector 400 The analysis of position.Additionally, this association can allow user to distinguish hazard detector by name also And manage the most discretely with single online management account.
Another example of the physical process that Fig. 8 R diagram is associated with step 756.Immediately following user After the selection completing button 844, application 814 can show the picture shown in Fig. 8 R To provide a user with the confirmation being provided with for the first hazard detector 400.First danger Danger detector 400 can also generate audio frequency and/or the visual indicator of correspondence.Such as, such as Fig. 8 R Shown in, hazard detector can be the position selected in step 756 place in " child bedroom " Below Shi Shengcheng voice: " child's bedroom apparatus is ready ".As an alternative, the first hazard detector 400 other audio frequency that can generate successful association and/or visual confirmations.These confirmations show first Hazard detector 400 on server 164 with online management account and selected position It is associated.User can rap continuation button 846 to confirm that this confirmation screen is checked.To the greatest extent Pipe is in order to complete the setting of the first hazard detector 400 perhaps without additional step, but uses Family still can proceed additional step to verify that the first hazard detector 400 is suitably rising Effect.Below the example of this proof procedure is described.
Method 730 can include as optional step (as indicated by the dotted line in Fig. 7 G-2) Step 758.At optional step 732, user can carry out the first hazard detector 400 Test is to verify that it is being properly acted upon.Fig. 8 S and Fig. 8 T diagram is associated with step 758 Physical process.As shown in Fig. 8 S, apply 814 can show and be used for notifying that user first endangers Danger detector 400 gets out start the picture of test.And if when user wants to start test Time, user can select to continue button 848.Application 814 can also show that user can be by movement Calculate device 816 and the router being linked to internet 162 (such as, " OurHouse " network) The notice reconnected.It is to say, do not exist by being carried by the first hazard detector 400 In the case of the connection of the Wi-Fi network of confession, the communication with the first hazard detector 400 is can now Can;Communication can be occurred by internet 162 via Cloud Server 164.
Application 814 can show the picture shown in Fig. 8 T to provide the first hazard detection The confirmation that the test of device 400 has been initiated.First hazard detector 400 can also generate correspondence Audio frequency and/or visual indicator.Such as, as shown in Fig. 8 T, the first hazard detector 400 Following voice can be generated: " test of child's bedroom apparatus started in ten seconds!”.As an alternative, First hazard detector 400 can generate other audio frequency and/or the visual confirmation that test is initiated.Survey Examination can include the generation of one or more alarm or warning to guarantee that device acts as correctly With.
Fig. 7 H-1 and Fig. 7 H-2 illustrates being performed by the first hazard detector 400 according to embodiment So as the method 760 of the pairing set up between the first hazard detector 400 and online management account. Similar with method 700 and 730, method 760 can be used in the most do not include one or more In the Intelligence home environment of the hazard detector of net.Method 760 discussed in detail below every Individual step, and additional with reference to the physics relevant with the step of method 760 can be provided to illustrate Some steps are discussed by figure (such as, Fig. 8 A-T).
At step 762 place of method 760, the first hazard detector 400 can be at battery lug It is drawn out thus exposes battery (such as, the battery (illustrating in Figure 4 A) of battery pack 450) Terminal and when the first hazard detector 400 provides power for operation or non-firm power receive electricity Power.Although the first hazard detector 400 can receive electric power in step 762 place, but it can Can be until the final step of method 760 just starts.
In step 764 place, the first hazard detector 400 may determine that it is the most via peace Dress plate 802 (shown in Fig. 8 C) is installed to family or the wall of other structure or ceiling. As discussed above, the first hazard detector 400 and installing plate 802 can include correspondence Feature so that first is dangerous when user twists the first hazard detector 400 on direction 808 Detector 400 becomes to be locked on installing plate 802, as seen in fig. 8 c.When sensor is true Fixed first hazard detector 400 installed on installing plate 802 time, the first hazard detector 400 can also include making the first hazard detector 400 " startup " or initiating its operating system Circuit and sensor.As described below, unless sensor determines the first hazard detector 400 is installed on installing plate 802, otherwise the first hazard detector 400 may not continue into Row step 766.
The advantage of the detection sensor that these are installed can be for the first hazard detector 400 Setting up procedure may be until it be installed in may having been installed within family or other structure (such as, on wall or ceiling) just starts.Therefore, setting up procedure can consider specific bar Part, environment and/or the position of the first hazard detector 400 has been installed.Such as, arranging During journey, the first hazard detector 400 can carry based on the position which network is installed to it Be connected to for strong signal network and/or with family or other structure to be provided with first dangerous The particular room of detector 400 is associated.Describe in detail hazard detector in this article Network connects and makes hazard detector be associated with the ad-hoc location in family or other structure Benefit.
In another embodiment, even if the first hazard detector 400 is not yet installed in installing plate On 802, the first hazard detector 400 can be at battery lug after step 762 place be drawn out Walk around step 764 and directly proceed with step 766.In this embodiment, the first dangerous inspection Survey device 400 still can be positioned proximate to it alternatively and be operated when battery lug is drawn out Rearmost position, it is not required that erecting device is so that setting up procedure starts.In some cases (such as, prefer to arrange its situation before the first hazard detector 400 is installed user Lower and/or user not to utilizing the location-based of the first hazard detector 400 and/or networking In the case of feature is interested) this flexibility is probably favourable.Briefly, it is not necessary to install First hazard detector 400 is to continue setting up procedure.
In step 766 place, the first hazard detector 400 can start.Additionally, as in Fig. 8 D Shown in, the first hazard detector 400 can generate music to indicate it to start, such as, Hazard detector can generate music via loudspeaker 550 (illustrating in figure 5 c).As an alternative, First hazard detector 400 can generate any kind of sound (such as, tone and voice) And/or various designator (such as, LED 652 can produce light according to predetermined pattern).
In step 768 place, hazard detector can receive button input.Such as, user is permissible 600 (illustrating in fig. 6) are pressed the button in direction 810 as going out as seen in fig. 8e, To start to communicate with the first hazard detector 400.As an alternative, hazard detector can be from User receives voice command.
In step 770 place, the first hazard detector 400 can generate audio frequency and/or visually indicate Symbol, as seen in fig. 8f, to indicate it to receive button input in step 768 place.Example As, the first hazard detector 400 can tell user's " device ready!Again by once testing.” First hazard detector 400 can also generate pulsed blue line 812.As discussed below, These designators generated at device and/or other spoken command may indicate that user is calculating dress The place of putting opens app or webpage to provide code.First hazard detector 400 can also generate Audio frequency and/visual indicator and via button 600 receive input, in order to permit a user to first The operation of hazard detector 400 selects language preference.Can be in following " intelligence hazard detection Device alarm and designator " part finds about this example discussed further.
In step 772 place, the first hazard detector 400 can create or provide interim Wi-Fi Network.Such as, as indicated by Fig. 8 K, the first hazard detector 400 can provide and be claimed Make the interim Wi-Fi network of " Device-659F38 ".As an alternative, the first hazard detector 400 Can provide for using other wireless protocols (such as, wireless association of mentioned herein other Any one in view) come and calculate what device (such as, mobile computing device 816) communicated Other networks one or more.This casual network can provide in the first hazard detector 400 The first hazard detector 400 and mobile computing device is allowed while being not attached to internet 162 The 816 the most initial means communicated.
In step 774 place, the first hazard detector 400 can connect from application 814 reception. Such as, as shown in Fig. 8 L, user can be via arranging app 834 by mobile computing device 816 It is connected to " Device-659F38 ".Hereafter, application 814 can be via " Device-659F38 " net Network is connected to the first hazard detector 400.As it has been described above, be connected to by the first hazard detector The 400 interim Wi-Fi network generated are without the need for password, and are therefore probably unsafe.One A little embodiments can include receiving from mobile computing device 816 can being used to mobile computing dress Put the local pair code that the identity of 816 is authenticated.Local pair code can be counted by mobile Calculate device 816 by QR code being scanned or obtaining by being manually entered by user ?.
In step 776 place, as shown in Fig. 7 H-2, the first hazard detector 400 can also be given birth to Audio frequency and/or visual indicator is become to notify user's mobile computing device 816 and the first hazard detection Device 400 is successfully connected by application 814.Such as, as shown in Fig. 8 M, hazard detection Device can generate following voice: " device is connected to app!”.As an alternative, the first hazard detection Device 400 can generate other audio frequency and/or visual confirmation being successfully connected.
In step 778 place, the first hazard detector 400 can be via interim Wi-Fi network (example As, " Device-659F38 " network) to the list of application 814 offer available network.These can The first hazard detector 400 is included it can be found that and be connected to its network with network.With this Mode, the first hazard detector 400 is able to ensure that and receives in step 780 (below) place Network credentials can use in step 782 (below) place corresponding to the first hazard detector 400 It is connected to the network of Cloud Server 164.In other embodiments, application 814 can generate The list of the available network of its own.But, in some cases (such as, in mobile computing Device 816 method 760 the term of execution keep off in the situation of the first hazard detector 400 Lower or electromagnetic interference experienced by the first hazard detector 400 and not by mobile computing device In the case of 816 experience), may be by the first dangerous inspection by the network of application 814 discovery Survey device 400 to access.
In step 780 place, the first hazard detector 400 can receive corresponding with network credentials Input.Such as, as shown in figure 8n, application 814 may indicate that user is from step 778 Place detects the master's house front yard selecting user in the list 837 of the Wi-Fi network being supplied to apply 814 Network.User selects the first hazard detector 400 can make for being connected to internet 162 Network, such as, " OurHuse " network.When being selected network by user, user can be in application At 814, input is for being connected to the password of selected network, as shown in Fig. 8 O.In step At 680, these certificates (such as, the identity of the home Wi-Fi network in association password) are permissible By application 814 transmission and received by the first hazard detector 400 so that the first hazard detection Device 400 can obtain internet 162 and Cloud Server via the router of selected network The access of 164.
In certain embodiments, the first hazard detector 400 can also be from mobile computing device 816 Receive the configuration information in addition to the identity of network credentials and home Wi-Fi network.Configuration information The account pairing token received from Cloud Server 164 can be included.Configuration information can also include Account ID of user account, mark Cloud Server 164 internet address DNS host name and / or out of Memory described in detail above.
In step 782 place, the first hazard detector 400 can use and receive in step 780 place To network credentials be connected to Cloud Server 164 to access home Wi-Fi network.First is dangerous Detector 400 may then pass through and uses the DNS host name provided in configuration information to be connected to Cloud Server 164.Such as, the first hazard detector 400 can be (such as, via website Nest.com) local network (such as, " OurHouse "), internet 162 and cloud it are connected to Server 164.First hazard detector 400 can generate the audio frequency of correspondence and/or visually indicate Symbol.Such as, as shown in figure 8p, hazard detector can generate following voice: " device is even Receive nest.com!”.As an alternative, first hazard detector 400 can generate and be successfully connected Other audio frequency and/or visual confirmation.These confirmations may further indicate the first hazard detector 400 It is associated with online management account and user is able to access that or is otherwise benefit from service 204 (figure 2 illustrates), such as, user can use computer (such as, desk-top calculating Machine, laptop computer or flat board) or other portable electron device (such as, smart phone 166) communicate with the first hazard detector 400.
In order to complete pairing process, the first hazard detector 400 can be by sending from manufacturing It is stored in the PKI certificate in the first hazard detector 400 and/or private during after period or manufacture Communication session with Cloud Server 164 is authenticated by the information that key obtains.To communication meeting After words are authenticated, the first hazard detector 400 can be by account ID and account pairing token It is sent to Cloud Server 164.Then Cloud Server 164 is able to verify that account pairing token makes in the early time The token and the mobile computing device 816 that send match and make the first hazard detector 400 with Matched by the user account specified by account ID.
In step 784 place, the first hazard detector 400 can receive and the first hazard detector The input that the position of 400 is corresponding.Can application 814 as shown in Fig. 8 Q as to Cloud Server 164 sends and receives this letter from Cloud Server 164 after the input that user receives Breath.Information is also stored in being supplied at the online management account of user and for strengthening The feature of the service 204 of the first hazard detector 400.Positional information can even be used to into One step configures the first hazard detector 400.Such as, the position of the first hazard detector 400 is permissible It is used to change alarm and is provided to user and/or how the first hazard detector 400 is explained by it The mode of the characteristic that sensor measurement arrives.If more specifically, the first hazard detector 400 quilt It is arranged in kitchen, then can reduce cigarette detection sensitivity (such as, low-level in kitchen Cigarette is probably normally so that can increase the alarm threshold value of cigarette) and/or police can be changed Report or warning order are (for example, it is possible to provide a user with more chance with for known safe cigarette Condition gain the initiative by striking first " making " alarm " solemnly silent ").
After the completing of step 784, the first hazard detector 400 can also generate audio frequency and/ Or visual indicator.Such as, as shown in Fig. 8 R, hazard detector can generate following voice: " child's bedroom apparatus is ready ".As an alternative, the first hazard detector 400 can generate successfully Other audio frequency of association and/or visual confirmation.These confirmations have shown the first hazard detector 400 Through being associated with selected position with online management account on Cloud Server 164.Although can Additional step can be need not, but the first hazard detector 400 still can proceed to add Step is to verify that it is being properly acted upon.Below the example of this proof procedure is described.
Method 760 can also include as optional step (as indicated by the dotted line in Fig. 7 H-2) Step 786 and 788.In step 786 place, the first hazard detector 400 can generate audio frequency And/or visual indicator is to confirm to be initiated the test of the first hazard detector 400.Such as figure Shown in 8S, if receiving the button of self-application 814 at the first hazard detector 400 Input or instruction (such as, when pressing continuation button 848 at application 814), the most permissible Initiate test.As an example, hazard detector can generate to be sent out for exact p-value The voice risen, such as, " test of child's bedroom apparatus started in ten seconds!", in Fig. 8 T Shown in.As an alternative, the first hazard detector 400 can generate test initiate other audio frequency and/ Or visual confirmation.
At optional step 788, the first hazard detector 400 can perform selftest to test Demonstrate,prove it be properly acted upon.Test can include the generation of one or more alarm or warning with Just guarantee that device works correctly.
In certain embodiments, it is possible to use speech recognition, aerial gesture, eye are followed the tracks of and blind Detection and/or other input medium realize during method 700,730 or 760 in application 814 The input that place provides.Again, as mentioned above, it is also possible to use the webpage calculating device Carry out method for generation 700,730 or 760.Although additionally, the first hazard detector 400 is with mobile The communication calculated between device 816 is described above as being occurred by Wi-Fi, but permissible Alternative uses by both the first hazard detector 400 and mobile computing device 816 institute Other wireless protocols supported.And, although it is described above by the first hazard detector 400 The a limited number of vision generated and audible indicator, but can also be by the first hazard detection Device 400 generates other designator during method 700,730 or 760.Can be in following " intelligence Can hazard detector alarm and designator " part finds additional example.
According to some embodiments, discussed as mentioned above for method 700,730 and 760, this A little methods can start after the first hazard detector 400 is mounted on the wall.But, In these embodiments, such as, via installing plate 802, first hazard detector 400 is arranged on wall On can trigger selftest process, thus can again verify the network connectivity of previously foundation. Preferably, in the first hazard detector 400 be multiple installation hazard detector in (an example As, the mesh network of hazard detector, as discussed with respect to FIG. 1) in the case of, first Hazard detector 400 can be programmed to confirm that the first hazard detector 400 is when mounted Mesh network connectivity whether the same the best with before the first hazard detector 400 is mounted or More preferable than before the first hazard detector 400 is mounted.By way of example, if Be installed to before wall the first hazard detector 400 and five other particular risk detectors it Between there is connectivity (directly or by central web node), then selftest is true Letter exists after the first hazard detector 400 is installed to wall at least those five that other is specific The connectivity of hazard detector.If not verifying that during selftest set up network connects Property and/or mesh network connectivity, then can the first hazard detector 400 or application 814 at Such notice is provided.
According to another embodiment, it is provided that be installed in them at family or other knot for checking The other method of the function of the hazard detector in relevant position in structure, such as, according to method The hazard detector of 700/730/760 is arranged.Contrast with the last embodiment discussed, can not By such as triggering this via installing plate 802 by mounted to a wall for the first hazard detector 400 Method.Consumer's Experience is as follows: user's walking is until any first danger in family or other structure Danger detector 400 and press the button 600 (illustrating in fig. 6) twice.In response to this, Hazard detector other hazard detector installed each in house (or other structure) is wide Broadcasting interconnection signal to enter in functional verification pattern, wherein, each hazard detector uses sound Band loudspeaker (such as, the loudspeaker 550 shown in Fig. 5 C) performs selftest and leads to Accusing, the result of this selftest occurs as it.Relative low-power channel radio can be used Letter circuit (for instance, it is possible to the IPv6 low-power wireless communicated according to 802.15.4 agreement Territory net (6LoWPAN) module or ZigBee module) broadcast interconnection signal.
As an example, during successful selftest, hazard detector can generate with Subaudio frequency: " testing cigarette detection to report to the police ... (beeping sound) (beeping sound) (beeping sound) cigarette Ann test success ... testing CO and reporting to the police (boop) (boop) (boop) ... CO reports Police is successfully tested " etc..As an alternative, each in hazard detector can have pre-assigned ID numbering (such as, numbering one is to the number of hazard detector of installation) and can generate Announce that they corresponding ID numberings are to indicate the interconnection signal broadcasted just by accordingly for repeatedly The voice that has successfully received of hazard detector.All of hazard detector can perform simultaneously In these selftests one or two and until they be instructed to stop.Oneself During test, user can walk around house or other structure, to confirm that each unit amasss Polar region and be suitably subjected to as desired its audible proof procedure.Hazard detector list can be passed through Another pair of button 600 in any one in unit is pressed and/or by smart phone app The order of (such as, application 814) place's input indicates hazard detector to stop this process.If Any one failure in selftest, then user can be by relocating one or more dangerous inspection Survey device, at strategic location add extraneous risks detector so that node circuit closed and/or Confirm that each hazard detector has been suitably arranged to unsuccessfully carrying out fault diagnosis.
In yet another embodiment, as illustrated in Fig. 7 I, method 790 can be used to survey The network connectivity of multiple hazard detector that examination or checking are arranged in family or other structure And/or mesh network connectivity.In the method not including installing the first hazard detector 400 At the end of the embodiment of 700/730/760, can be by such as endangering first via installing plate 802 Detector 400 is mounted to a wall triggers the method in danger.At step 792 place of method 790, Cloud Server 164 can initiate in response to installing the first hazard detector 400 communication check or Network connectivity is verified.Such as, Cloud Server 164 can connect from mesh network hazard detector Receive the notice that instruction hazard detector is installed.In response to this notice, Cloud Server 164 can Instruction is sent with the hazard detector (such as, the first hazard detector 400) on mesh network. The instruction received at hazard detector can make each hazard detector use relative low-power Radio communication circuit (for instance, it is possible to the IPv6 low-power communicated according to 802.15.4 agreement Wireless Personal Network (6LoWPAN) module or ZigBee module) broadcast interconnection signal to each other.
In step 794 place, Cloud Server 164 can be with the knot of the communication check of receiving step 792 Really.These results may be configured to be seen by each in corresponding hazard detector The list of hazard detector.Each hazard detector can directly communicate it to Cloud Server 164 Corresponding list.As an alternative, mesh network can include use low power communication circuit come with " mouthpiece " node hazard detection that other " low-power " node hazard detector communicates Device, then passes on the result received from " low-power " node to Cloud Server 164.Then, The result that it receives can be communicated application 814 by Cloud Server 164, and described result is (such as, Living room, kitchen, master bedroom hazard detector can be checked by child bedroom hazard detector) It is then displayed in applying on the communication check interface of 814, as shown in Fig. 8 U.Additionally, should Can receive and show other communication check result, such as, specifically which dangerous inspection with 814 Survey device to be seen by each in other hazard detector.Each hazard detector is all right Display indicator (such as, the green glow generated at hazard detector), to show hazard detection Device is it can be seen that at least one other hazard detector in mesh network and/or at mesh network At least one network is there is between any hazard detector and other hazard detector any in network Path.
In step 796 place, Cloud Server 164 may determine that network connectivity is verified the most, That is, whether mesh network misses any hazard detector.Cloud Server 164 can be by by this A little results with and the history of hazard detector matched of online management account compare with according to step The result of rapid 794 determines whether any hazard detector is missed and makes this and determine.As an alternative, Application 814 can be similarly by the result of step 794 and via application 814 or with other side Formula compares with the history of the hazard detector that online management account is matched.
If do not verify network connectivity in step 796 place, then may need again to perform step 792 and 794.But, if network connectivity is verified, then method 790 can continue directly to Carry out step 798, i.e. communication check can terminate.In some cases, as discussed above , will not require user and input manually to verify network connectivity in step 796 place.But, User still can provide the input corresponding with the determination of step 796.Such as, as in Fig. 8 U Shown in, if user wants to verify network connectivity in step 796 place, " OK, user can select Excellent!" button 850.If it find that network connectivity is problematic, then user can also select Fault diagnosis button 855.User can be by relocating one or more hazard detector, in war Extraneous risks detector is added so that node circuit closed, confirming each hazard detection in slightly position Device has been suitably arranged and/or other method carrys out fault diagnosis.Hereafter, can repeat step 792, 794 and 796 such as by the required or desired number of times of user, server and/or hazard detector institute, To solve and confirm the network of the mesh network of the hazard detector in family or other structure even Connect the solution of problem.
Rational design for the second intelligence hazard detector
In some cases, user may want to add more than one hazard detector to intelligence Home environment is to create such as mesh network referenced above.In certain embodiments, can be with pin To extraneous risks detector repetition methods 700,730 and 760 to make they and online management account Family is matched.As an alternative, for add the method for extraneous risks detector can be so that involved The amount that user makes great efforts reduces or the mode that minimizes changes according to method 700,730 and 760. Show that using method 700 (and method 730 and 760) adds the first danger in the following figure The revision of danger detector and using method 700 (and method 730 and 760) added originally The example of the method for extraneous risks detector.
Fig. 9 diagram according to embodiment be used for make two or more hazard detector (such as, First hazard detector 400) and the method for online management account pairing.Step in method 900 At 905, the embodiment of method 700 can be performed by Cloud Server 164 to make the first dangerous inspection Survey device and the pairing of online management account.Can also viewpoint from user and hazard detector exist respectively Step 905 place performs method 730 and method 760.
In step 910 place, send and make the first hazard detector in the first hazard detector and second The instruction of radio communication is set up between hazard detector.In order to realize step 910, user can be Calculate and open or install on device (such as, calculating device 816) and open app (such as, Application 814).As an alternative, use can be configured to and online management when performing step 910 The webpage that account communicates.When opening app, can select in app interface to be used for adding The option of another hazard detector (the second hazard detector).Use the wireless association of such as Wi-Fi View, app then can be via server (such as, Cloud Server 164 (figure 1 illustrates)) Instruction is sent to the first hazard detector with internet 162 (figure 1 illustrates).Such as, may be used To indicate the first hazard detector to use and home Wi-Fi network separate local device network, all If communicating to provide the low merit of IPv6 of 6LoWPAN network according to 802.15.4 agreement Rate Wireless Personal Network (6LoWPAN) module.Can communicate according to 802.15.4 agreement ZigBee module can be utilized to provide network.As another example, it is possible to according to by Thread Group issues and agreement based on 802.15.4, IETF IPv6 and 6LoWPAN is led to Thread (thread) module of letter can be used to network.
The local device network provided by the first hazard detector can use can be dangerous by other Only network title that detector is identified and/or assign to itself and include junction prefix One or more IPv6 addresses.Junction prefix can help hazard detector mark, and it should add Network.As an alternative, can identify it as being added into allow the second hazard detector Network another way provide local device network.Second hazard detector can also be with similar Mode provides local device network.When a hazard detector finds the basis of another hazard detector During ground plant network, it can terminate it and adds network and be connected to by another hazard detection The network that device provides.Therefore, the first hazard detector can add the net of the second hazard detector Network and vice versa.In a word, local device network can be passed through or utilize low-power wireless Agreement operation another network between the first hazard detector and the second hazard detector with this Mode sets up radio communication.
In step 915 place, send and make the first hazard detector and the second hazard detector share net The instruction of network certificate.Instruction can be stemmed from app and can be come by the first hazard detector Route.Hereafter, the first hazard detector can utilize by the second wireless protocols (that is, local Plant network) between it and the second hazard detector set up radio communication to share network Certificate.Network credentials can include for being connected to internet 162 by home Wi-Fi network Network router title and password.This network router just can also is that the first hazard detector Network router in the instruction made for receiving step 910.Second hazard detector can make It is connected to internet 162 by network credentials.Hereafter, the first hazard detector and the second dangerous inspection Survey device to disable their local device network and use Wi-Fi to come via network router It is connected to internet, in order to the app being positioned at Cloud Server 164 and/or online management account Communicate.
In step 920 place, the revision of method 700 (figure 7 illustrates) can be performed To use the first wireless protocols to set up between the second hazard detector and online management account New pairing.The revision of the method 700 of step 920 can include the institute of embodiment in steps And the change with several exception of method 700.Such as, at the amendment step of 707, Step 920 can automatically use and have stored in the online management account certificate at app and make Second hazard detector is associated with online management account, replaces creating or Input Online management Account certificate.Additionally, step 920 will the most not require to be connected to the second hazard detector Internet 162, because achieved this connection at above step 915.Similarly, in step At rapid 920, the revision of method 730 and 760 will need not perform method 730 and 760 Corresponding step, such as, respectively step 740,742 and 754 and step 772,774,776 With 778.
Therefore, method 900 can be in the way of allowing to require user's effort that ratio method 700 is few Add extraneous risks detector.Step can be repeated for the 3rd or other extraneous risks detector 910-920, replaces the second device by next one device in step 910-922, in order to by the 3rd Or other extraneous risks detector adds Intelligence home environment to.Furthermore, it is possible to be not related to One device (such as, use the second device that the 3rd device is set, thus in step 910-920 Middle by second device replace first device and the 3rd device is replaced the second device) in the case of Repeat step 910-920.
As mentioned above, the hazard detector according to the present invention can be during setting up procedure Audio frequency and/or visual indicator is provided feedback to be guided and are supplied to user.Can be in method 900 Period provides similar audio frequency and/or visual feedback.Again, although be described above by first A limited number of vision that hazard detector 400 is generated and audible indicator, however all right During method 900, other designator is generated by the first hazard detector 400.There is provided with figure below How first hazard detector can be used to the additional example and more of extraneous risks detector Complete discussion.
Figure 10 diagram providing in the case of the second hazard detector 1002 according to some embodiments Some in the device related to.Going back to Fig. 1 briefly, router 160 can be communicatively coupled to Internet 162 and being configured to and central server or cloud computing system 164 (" Cloud Server ") Communicate.It is internal that router 160 may be located at structure 150, such as will in hazard detector The household internal of the user being installed in.
According to above method 700, the first hazard detector may be mounted and take at cloud Match with user account 1004 at business device 165.User can use mobile communications device 816 (such as mobile phone) communicates with the first hazard detector 400.Generally, will be by route Device 160 sets up home Wi-Fi network in structure 150.First hazard detector 400 can be led to Cross router 160 and internet 162 to carry out with Cloud Server 164 and mobile computing device 816 Communication.
Using this configuration set up, user may want to install the second hazard detector 1002. Second hazard detector 1002 can be arranged in another region of structure 150.Such as, may be used So that the first hazard detector 400 is arranged on ground level, simultaneously can be by the second hazard detection Device 1002 is arranged on the second ground level.As it has been described above, user can be according to described above Method 700 arranges and makes the second hazard detector 1002 match.But, this may relate to defeated Enter the same steps of Wi-Fi password, mark local network etc..Method 900 and following discussion provide Needed for the possibility of user error can being greatly reduced and the second hazard detector 1002 being set Time and effort amount for arrange and make second hazard detector 1002 pairing more reasonable Change method.
Figure 11 is shown in offer and makes in the device that the second hazard detector 1002 relates to when matching The initial state of each.Figure 11 is shown in quilt before activation the second hazard detector 1002 Storage particular data on each device.Should be appreciated that the data shown in Figure 11 are not Detailed, and they only prominent certain types of information that may require during pairing process. Start from mobile computing device 816, account password 1114 can be stored.Account password 1114 may By user's previously input when setting up user account 1004 with Cloud Server 164.At some In embodiment, account password 1114 can be stored on mobile computing device 816.Such Storage can have encryption format.In other embodiments, can arrange period input and Account password 1114 is shared with user account 1004.Hereafter, Cloud Server 164 can be to movement Calculate device 816 and send authentication token.In the future, mobile computing device 816 can be with cloud service Device 164 is shared authentication token and should be allowed access to user to be supplied to mobile computing device 816 The Cloud Server 164 of account 1004.As an alternative, authentication token can be used to from mobile meter The communication that calculation device 816 sends to Cloud Server 164 is encrypted and/or signs, thus prevents The needs of the secret information of such as password are sent during each communication.In certain embodiments, The SSID 1110 and LAN that mobile computing device 816 can also store home Wi-Fi network is close Code 1112.However, it is possible to SSID 1110 and LAN password 1112 is stored in mobile computing On device 816 so that they can not be readily used for such as the first hazard detector 400 and Other device of second hazard detector 1002 is shared.Therefore, SSID 1110 and/or LAN Password 1112 may need when matching with the second hazard detector 1002 to be possibly retransmission shifting Move device 816 or be manually input in mobile device 816.As will be described below, Can be sent to move from the first hazard detector 400 by SSID 1110 and LAN password 1112 Dynamic device 816 so that user need not input this information for the second time.
Router 160 generally can store SSID 1110 and LAN password 1112 for right Wish that other device communicated by home Wi-Fi network is authenticated.At Cloud Server 164 Place, user account 1004 can store as by be described in more detail below during pairing process The access token 1108 used.Access token 1108 includes being used to checking manages and the The secret information of the identity of the device that one hazard detector 400 communicates.User account 1004 Account password 1114 can also be stored.But, in most embodiments, user account 1004 To alternatively store the hashed version 1104 of password.Then account password 1114 can be counted by mobile Calculate device 816 Hash and be sent to Cloud Server 164 to verify.This prevent for (" the clear ") form not hashed sends the needs of account password 1114 by internet.
First hazard detector 400 can include being used in method 700 as described above First device code 1116.Because the first hazard detector 400 with user account 1004 Pairing, so what the first hazard detector 400 obtained during also will be stored in the first pairing process SSID 1110 and LAN password 1112 so that it is connectable to home Wi-Fi network.With What sample obtained during the first pairing process is account certificate 1118.Account certificate includes can It is used to verify the encrypted message that another device has access token 1108.Will in further detail below Ground describes the further use of account certificate 1118.In certain embodiments, in shell 150 Wired home device can enter each other via local device network separate with home Wi-Fi network Row communication.As it has been described above, local device network can be 802.15.4 compatible network, such as ZigBee Network or Thread network.Local device network can be used to various wired home devices it Between send warning message, state updates, health examination information and/or analog and be used as this Ground mesh network.Such as, when danger being detected by the first hazard detector 400, even if should Danger is only detected by the first hazard detector 400, it is also possible to via local device network to Two hazard detector 1002 send message so that two same hour hands of hazard detector 400,1002 The occupant of shell 150 is sent out alarm sound.Will be by for adding the information of local device network One hazard detector 400 stores with the form of plant network information 1122.Finally, second is dangerous Detector 1002 can store unique for the second hazard detector 1002 and in the manufacture phase Between or manufacture after during provide the second device code 1120.Such as first device code 1116, Second device code 1120 can be printed on the mark on the back side of the second hazard detector 1002 Sign and/or with the QR code that optically or electronically can be read by mobile computing device 816, Bar codes etc. encode.
Figure 12 A-12E is shown in mobile device 816 and runs to start and the second hazard detector The user interface of the application 814 of the pairing process of 1002.For the second hazard detector 1002 Rational design process is possibly realized because another existing wired home device with user Account 1004 is matched.Solely for illustrative purposes, the existing intelligence used in the disclosure Home devices will be the first hazard detector 400.But, it is restricted that other embodiments is not necessarily so, And also other wired home device can be used.Such as, with the intelligence of Cloud Server 164 compatibility Energy utensil, intelligent thermostat and/or home security system sensor unit can be utilized to pairing Second hazard detector 1002.
In order to begin for the setting up procedure of the second hazard detector 1002, user can be by swashing Live the application (such as, application 814) run on mobile computing device 816 and start.Figure The interface of 12A provides a user with for making the second hazard detector 1002 can be used for setting up procedure Initial order.In this scene, user has been indicated on the second hazard detector 1002 From installing plate, remove it in the case of Bei Anzhuan and press continuation.When pressing continuation, should Other wired home device that search is registered will be started to user account 1004 with 814.Figure 12 B Interface diagram user can the most notified such search occur.By the side of example Formula, user may make intelligent thermostat and smart home security system together with the first dangerous inspection Survey device 400 to be mounted together.Sometimes, some wired home devices can provide than other intelligence Home devices widely user interface.Such as, intelligent thermostat can provide more dangerous than first Detector 400 widely user interface.User is allowed to use or check such device User interface substitutes and uses the first hazard detector 400 to be probably favourable.Therefore, some are real Execute example and can give tacit consent to the wired home device attempting to connect to have advanced user interfaces, such as exist Picture before attempting to connect to the first hazard detector 400 and selectable user's input capability. Such as, how Figure 12 C diagram application 814 can first attempt to be connected to intelligent thermostat.
Occasionally, the device (such as intelligent thermostat) with higher level user interface may be During pairing process unavailable.User is also may want to ignore these other wired home devices also And connected by the first hazard detector 400.Figure 12 D illustrate the first hazard detector 400 what Time in default situations, by select or be selected for making because other device is unavailable Second hazard detector 1002 is matched.In the configuration, application 814 can show that first is dangerous The graphic icons 1204 of detector 400 and the second graph figure of the second hazard detector 1002 Mark 1206 so that user can easily understand that the first hazard detector 400 will be used to install Second hazard detector 1002.
In order to initiate the communication between mobile device 816 and the first hazard detector 400, will refer to Show that user " wakes up " the first hazard detector 400 up.Rotating back into Fig. 8 E briefly, user is permissible The direction 810 gone out as seen in fig. 8e presses the button 600, to start and the first dangerous inspection Survey device 400 to communicate.As an alternative, user can use voice command to start and the first danger Danger detector 400 communicates.As response, the first hazard detector 400 can generate sound Frequency and/or visual indicator, as seen in fig. 8f.Such as, the first hazard detector 400 is permissible Tell user " device ready!Again by once test ".First hazard detector 400 is all right Generate pulsed blue 812.User by as suggested in application 814, user's input being supplied to the After one hazard detector 400, user can select " continuation ", applies 814 after this Can begin to try to be connected to the first hazard detector 400.In certain embodiments, first is pressed First hazard detector 400 can be placed in and can find by the button 600 in hazard detector 400 In pattern so that mobile computing device 816 can position it.Figure 12 E diagram user will be along with The interface that mobile computing device 816 attempts to be connected with the first hazard detector 400 and sees.
Experience and in order to how understand at various wireless networks to describe the user class of pairing process Transmit both data between network, the discussion below by figure with to the description of Consumer's Experience and figure And replace between the description of data flowchart.Figure 13 diagram makes according to the access of some embodiments Board 1108 is delivered to the flow chart of mobile computing device 816.For the second hazard detector Before the starting stage of the pairing process of 1002 or at certain point of period, it is possible to by internet 162 And/or access token 1108 is passed to mobile computing device 816 by router 160.(note, Mobile computing device can also not have via another available network or use cellular data technology Internet 162 it is directly connected in the case of router 160.) in some embodiments it is possible to Mobile computing device 816 and Cloud Server 164 communicate whenever by access token 1108 pass to mobile computing device 816.Access token 1108 provides for mobile computing device 816 directly lead to the first hazard detector 400 in the case of without by internet 162 The mode while letter, itself being authenticated.Mobile computing device 816 can use access Token 1108 proves that it should be able to access the first hazard detector 400.Recall first dangerous Detector 400 has the account certificate 1118 that can be used to authentication-access token 1108.? On low degree, if mobile computing device 816 does not have access token 1108, then for During either phase in the starting stage of the pairing process of two hazard detector 1002, it is possible to will Access token 1108 passes to mobile computing device 186 from user account 1004.An enforcement In example, when " continuation " on the interface that user clicks on Figure 12 A, mobile device 816 can Access token 1108 is asked from Cloud Server 164.
Figure 14 diagram is passed to from the first hazard detector 400 according to the information of some embodiments The flow chart of mobile computing device 816.Mould can be found the first hazard detector 400 being placed in After under formula, mobile computing device 816 can be by the local Wi-Fi created by router 160 Network sets up wireless connection with the first hazard detector 400.Note, mobile computing device 816 And this communication between the first hazard detector 400 not need not access external network, and the most not Need to be communicated with Cloud Server 164 by internet 162.Alternatively, mobile computing dress Put 816 to communicate via local 802.11Wi-Fi network according to known method.At some In the case of, mobile computing device 816 may be connected to the first danger by local Wi-Fi network Have any problem during detector 400.Such as, one or two device can be in the basis in structure 150 In dead band, ground, or local Wi-Fi network is likely to be received and does from the interim of external electrical magnetic source Disturb.In such a case, it is possible to follow standby routine, wherein, the first hazard detector 400 Create the local Wi-Fi access point that the mobile computing device 816 of its own can join.Mobile The application 814 calculated on device 816 is capable of informing a user that the first hazard detector 400 has been created Build mobile computing device 816 to require connect to complete the interim Wi-Fi network of setting up procedure. As mentioned above for described by Fig. 8 K-8M, application 814 can indicate that user exits setting temporarily Program and the Wi-Fi of mobile computing device 816 being arranged is switched to by the first hazard detector The 400 interim Wi-Fi network created.For instance, it is possible to instruction user is by mobile computing device 816 Wi-Fi network be switched to " Device-659F38 ".So, mobile computing device 816 and One hazard detector 400 remains able in the feelings not using router 160 and home Wi-Fi network By Wi-Fi agreement provisional communication during setting up procedure under condition.
Once between mobile computing device 816 and the first hazard detector 400, establish communication, Itself just can be carried out by mobile computing device 816 alternatively to the first hazard detector 400 Certification.This certification can be promoted via access token 1108 and account certificate 1118.One In a little embodiments, mobile computing device 816 can send the token 1108 that accesses to your account encrypt, Signature or the packet otherwise revised.First hazard detector 400 is able to receive that so Information and information of the verifying certificate 1118 that accessed to your account utilize access token 1108 to sign/add Close/amendment, and therefore the identity of mobile computing device 816 is authenticated.
After authentication, the first hazard detector 400 can by home Wi-Fi network come to Mobile computing device 816 sends the information selected.(by the connection of home Wi-Fi network not In the case of Ke Neng, the first hazard detector 400 can be by by the first hazard detector 400 To send, to mobile computing device 816, the letter selected as standby generated interim Wi-Fi network Breath.) in certain embodiments, the first hazard detector 400 can send SSID 110, LAN Password 1112 and/or plant network information 1122.By receiving from the first hazard detector 400 SSID 1110 and LAN password 1112, mobile computing device 816 is no longer necessary to inquire that user supplies (such as, user need not select home Wi-Fi network and again input them to answer such information WEP/WPA password).
Additionally, mobile computing device 816 can send second to the first hazard detector 400 Hazard detector 1002 will add the instruction of network.This instruction is solved by the first hazard detector 400 It is interpreted as the instruction that it should start itself broadcasts as can find on local device network.Can To set up this locality via the relative low-power radio communication circuit in the first hazard detector 400 Plant network is with in Thread module or the low merit that can communicate according to 802.15.4 agreement Broadcast in rate Wireless Personal Network (6LoWPAN) module or ZigBee module.Such as, one In individual embodiment, it is possible to use Ember EM357 6LoWPAN module realizes relatively low merit Rate radio communication circuit.In certain embodiments, the first hazard detector 400 can be such as Broadcast on the 802.15.4 compatible network of Thread network.This network will be referred to as " local device Network ", and the wired home device in shell 100 can use this local device network come Communicate among they are own.First hazard detector 400 will be limited on local device network The time of amount broadcasts as adding.In other words, the first hazard detector 400 is limited Broadcast it in time window to be added by the wired home device of such as the second hazard detector 1002 The beacon entered.Additionally, mobile computing device 816 can indicate that the first hazard detector 402 On local device network, not only broadcast beacon, and as response it is also expected to the second hazard detection Device 1002 is ultimately connected to this local device network.The connection of the second hazard detector 1002 is Interim, because it not yet experiences account pairing process.Upon the second hazard detector 1002 Such connection received by the first hazard detector 400, just further instruction first is dangerous Detector 400 notifies mobile computing device 816.As will be described further below, the first danger Danger detector 400 then can as the second hazard detector 1002 on local device network with The bridger between mobile computing device 816 on home Wi-Fi network.
Once the first hazard detector 400 has begun to broadcast as sending out on local device network Existing, and before the second hazard detector 1002 is added temporarily, mobile computing device Application 814 on 816 just can indicate that user starts to prepare the second hazard detection for pairing process Device 1002.Initially, the second hazard detector 1002 can be retouched as mentioned above for Fig. 8 A-8B As stating in packaging.In order to start setting up process, may indicate that user unties second dangerous Detector 1002 and the second device code 1120 of the second hazard detector 1002 is input to In application 814.Such as, the interface of previously application 814 shown in Fig. 8 H may indicate that User manually input in field 822 second device code 1120 alphanumeric version and " completing " button 824 is selected at the end of.As an alternative, user can select scan button 826 To bring the interface of previous application 814 shown in Fig. 8 I.The second danger can be positioned at QR code and/or alphanumeric code is found on paster 828 on the back side of detector 1002, Just as finding it on the backboard 420 of the first hazard detector 400.As shown in Fig. 8 I, Application 814 entrance camera mode interface is to allow user's shooting be positioned on paster 828 and suffer The picture of the QR code of alphanumeric code 832.Fig. 8 J is shown input in field 822 Alphanumeric code 832.Again, can be by alphanumeric code 832 be manually inputted In field 822 or by QR code 830 (shown in Fig. 8 I) is scanned also And allow application 814 determine alphanumeric code 832 and be entered in field 822 real Show this.Then user can press button 824, in order to indicate the second device code 1120 It is correctly received.
Figure 15 A-15C diagram according to some embodiments for activate the second hazard detector 1002 User interface.As mentioned above for described by Fig. 8 E-G, can by pull-out battery lug also Therefore supply electric power to the second hazard detector 1002 and activate the second hazard detector 1002.As Fruit has pulled out battery lug, then user can press the button in the second hazard detector 1002 Or other user input apparatus is to activate the second hazard detector 1002.In certain embodiments, Second hazard detector 1002 can indicate it by giving user by audio/visual designator Ready.Such as, the second hazard detector 1002 can be noticed it audibly and wakes up and prepare Good test.Alternatively or additionally, the second hazard detector 1002 can be as described above Near center button, right side provides rotation coloured aperture like that.Figure 15 A diagram user can be as What is activated the second hazard detector 1002 by application 814 instruction.Figure 15 B diagram is acceptable Audio/visual designator so that user can by the response of the second hazard detector 1002 with as by The intended response that application 814 is provided compares.
Figure 15 C is illustrated as the second hazard detector 1002 and selects the interface of language.An enforcement In example, the second hazard detector 1002 can send the audio signal of instruction available language.Such as, Second hazard detector 1002 can be said " English " the most in English, say with Spanish " Espanol " etc..Along with the second hazard detector 1002 cycles through available language, it is possible to instruction User provides user to input when saying suitable language to the second hazard detector 1002.Such as, User can be when he/her hears word " English " noticed by the second hazard detector 1002 Press the button in the second hazard detector 1002.
In certain embodiments, can be made speech selection feature certainly by the second hazard detector 1002 Dynamicization.Such as, process after the second hazard detector 1002 can include during manufacture or manufacture The GPS device of middle programming or country code.Any one in these can be used to without The appropriate languages of the second hazard detector 1002 is determined in the case of the input of user.One In a little embodiments, once the second hazard detector 1002 is connected, its language just can by with family The IP address that front yard Wi-Fi network is associated determines.In these embodiments, the second dangerous inspection Survey device 1002 during setting up procedure, user need not be inquired with regard to Preferred Language, but alternatively can Till enough waiting until after set-up is complete.It is being provided with and hazard detector can be visited Ask such as home address, IP address and pass through what internet 162 sent from Cloud Server 164 After the things of information.Second hazard detector 1002 can use the information to determine preferred language Speech.As an alternative, once it is provided with, it becomes possible to by IP address, home address, gps coordinate It is sent to Cloud Server 164, and Cloud Server 164 can make the determination about Preferred Language. Not can determine that position in the second hazard detector 1002 or the feelings of language can not be determined based on position Under condition, the second hazard detector 1002 can be just for selecting the additional input of Preferred Language to carry Show user.Such as, there are some cities of a large amount of bilingual population to have and be based simply on Preferred Language (such as Las Vegas's (English and Spanish) or the Montreal of position (English and French)).In these positions, further user input is probably may at two kinds Preferred Language (such as, Spanish and English) in the middle of select necessary.Cloud Server 164 can provide possible excellent to the second hazard detector 1002 during or after setting up procedure Select the list of language, and then can point out user between those two possible Preferred Languages Select.
Figure 16 diagram is counted with mobile according to conduct second hazard detector 1002 of some embodiments First hazard detector 400 of the bridger between calculation device 816.Activating or " waking up up " After second hazard detector 1002, it is possible to automatically the second hazard detector 1002 is placed in " search " under pattern.While searching, the second hazard detector 1002 can start search The local device network being compatible with.Such as, the second hazard detector 1002 can start search 802.15.4 compatible network.In certain embodiments, the second hazard detector 1002 can be distinguished The 802.15.4 network compatible with wired home device and with other of wired home device compatibility 802.15.4 network.
In certain embodiments, the second hazard detector 1002 can also be interim Wi-Fi network Create Wi-Fi access point.This interim Wi-Fi network can not be led in the second hazard detector 1002 Cross local device network 1602 set up with the first hazard detector 400 be connected in the case of can be by As alternative plan.In these cases, mobile computing device 816 is connectable to by second Hazard detector 1002 create Wi-FI access point and proceed as mentioned above for method Setting up procedure described by 700.
As it has been described above, the first hazard detector 400 was previously indicated by mobile computing device 816 Beacon can be added for other wired home devices broadcasting on local device network 1602.First By previously instruction, hazard detector 400 is also notified that the new wired home of mobile computing device 816 fills Put and when be connected to local device network 1602 in response to beacon.When the second hazard detector 1002 when attempting to join local device network 1602, and the first hazard detector 400 can allow for Two hazard detector 1002 add local device network 1602 temporarily.Added by interim, second Hazard detector 1002 need not supply any certificate, and can be permitted in limited time interval Can to the access of local device network 1602 and/or can temporary time interim from Second hazard detector 1002 allows the communication of limited kinds.In other embodiments, certificate energy Enough during manufacture process or after manufacturing during be stored in the second hazard detector 1002 with Identify as the clone of intelligent home system, and those certificates can be supplied to One hazard detector 400 is to award interim member relation in local device network 1602 Power.
Then first hazard detector 400 can pass through home Wi-Fi network 1604, and (it may Relate to router 160 or some other type of access point) carry out with mobile computing device 816 Communication.Being important to note that, mobile computing device 816 generally will not have and such as local dress Put the radio of the 802.15.4 Web-compatible of network 1602.Additionally, the second hazard detector 1002 will give its SSID 1110 He to the access of home Wi-Fi network 1604 by not having / or LAN password 1112, until after in the provisioning process.Therefore, in order at family Wi-Fi The second hazard detector 1002 is provided, for the user on Cloud Server 164 on network 1604 Account 1004 registers the second hazard detector 1002, and in order to make the second hazard detector 1002 Matching with mobile computing device 816, the first hazard detector 400 can be as local device net Bridger between network 1602 and home Wi-Fi network 1604.Substantially, the first hazard detection Device 400 can be formed and simply from home Wi-Fi network 1604, packet be passed to this locality The tunnel of plant network 1602.Because the first hazard detector 400 is provided at family Wi-Fi Operate on network 1604 and be equipped with and the wireless Denso of local device network 1602 compatibility Put, so the first hazard detector 400 can transmit packet between the two networks.? In some embodiments, the first hazard detector 400 need not provide the second hazard detector 1002 Time play any positive effect, but alternatively can transmit data the most back and forth.In other words Saying, the first hazard detector 400 need not understand or participate in mobile computing device 816 and the Session between two hazard detector 1002.
In addition to promoting the communication between the most incompatible device, by the first hazard detector 400 The tunnel provided can also provide other benefits many.Commonly, the most such as The wired home device of hazard detector 400,1002 receives periodic software upgrading.At one In scene, the first hazard detector 400 may be installed relatively long in shell 154 Time period (such as, more than 2 years).Period between at this moment, the first hazard detector 400 can Can have been received by having been directed to communication protocol, initialize and being permitted of pairing process and/or analog Many software upgradings.By contrast, may be roughly the same with the first hazard detector 400 Time manufactured the second hazard detector 1002, but the second hazard detector 1002 may be It is positioned in shop shelf and reaches the several years.Therefore, when the second hazard detector 1002 is by user installation, Software in second hazard detector 1002 may be the most out-of-date.In order to use the first hazard detection Device 400 provides the second hazard detector 1002, the first hazard detector 400 to keep With the operation software each version backward compatibility since starting.Maintain the backwards compatibility will be can Bring a large amount of in being battery powered and being expected to unusual low-power environment on the device of operation Programming effort and memory space.But, by simply providing tunnelling function, first is dangerous Detector 400 only need keep with by the second desired tunnel protocol of hazard detector 1002 after To compatibility.Mobile computing device 816 and/or Cloud Server 164 typically will can keep and use The more power device of remainder backward compatibility in the software of the second hazard detector 1002. They can also provide software upgrading for the second hazard detector 1002 during setting up procedure.Phase Under Bi, the first hazard detector 400 (its may need relative low-power and its can use Relatively low complexity microprocessor) can keep ignoring these software upgradings and backwards compatibility.
Figure 17 diagram is set up by the first hazard detector 400 according to passing through of some embodiments The data that communication tunnel transmits.First, mobile computing device 816 will be the most by QR code scans or receives being manually entered of user and receive the second device code 1120.By providing device code 1120 (or the letter using device code 1120 to encode/sign Breath), mobile computing device 816 can to the second hazard detector 1002 prove it be authorized to Second hazard detector 1002 communicates.In certain embodiments, can be in the second dangerous inspection Survey and between device 1002 and mobile computing device 816, exchange token or pair code, with via family Wi-Fi network 1604 promotes communication in the future.
In addition to checking the second device code 1120, mobile computing device 816 can send and pass through Home Wi-Fi network 1604 communicates required information.In one embodiment, mobile meter Calculating device 816 can be by the tunnel that created by the first hazard detector 400 by SSID 1110 And/or LAN password 1112 is sent to the second hazard detector 1102.Second hazard detector 1002 then can select as by the home Wi-Fi network 1604 specified by SSID 1110 and LAN password 1112 is used to obtain the access to home Wi-Fi network 1604.Further, Second hazard detector 1002 can be communicated by home Wi-Fi network 1604.
Additionally, plant network information 1122 can be sent to the second danger by mobile computing device 816 Danger detector 1002.As noted above, the second dangerous inspection on local device network 1602 The current connection surveyed between device 1002 and the first hazard detector 400 connects the most temporarily.Temporarily Connection may be restricted on time and/or scope.In order to more permanent with local device network 1602 Ground connects, and the second hazard detector 1002 must be to being connected to the of local device network 1602 One hazard detector 400 and/or other intelligent apparatus provide certificate.In certain embodiments, net Network device information 1122 can include the username and password of 802.15.4 compatible network.Using In the embodiment of Thread/Weave network described above, plant network information 1122 is permissible Including Weave user name and/or password and Fabric ID and/or key.Use this device net Network information 1122, the second hazard detector 1002 is currently capable of such as by adding local Weave Network sets up longer-term communication with local device network 1602, and therefore from other wired home Device receives the message relevant with the danger detected and/or analog.
Second hazard detector 1002 is currently capable of being connected with Cloud Server 164 and making itself It is associated with user account 1004.This may relate to make the second hazard detector 1002 and user Account 1004 is associated.Although explicitly not illustrating in prior figures, but when access token 1108 It is that when sending before setting up procedure, Cloud Server 164 can be to mobile computing device 816 Send service profile information.This service profile information can include that service node identifier, mark are used The globally unique account of family account, mark service entrance DNS host name and Opaque account pairing token.Together with SSID 1110, LAN password 1112 and/or device net Together, mobile computing device 816 can also be by by the first hazard detector 400 for network information 1122 The tunnel provided sends configuration information to the second hazard detector 1002.In order to complete pairing Process, then the second hazard detector 1002 can use DNS host name and service node mark Know symbol to set up communication session with Cloud Server 164.Second hazard detector 1002 is then based on Itself is authenticated, then by its numeral PKI certificate and private key thereof to Cloud Server 164 Send account and account pairing token.Checking received by account pairing token and During account, Cloud Server 164 then sets up the second hazard detector 1002 and user's account Pairing between family 1004.
In certain embodiments, this communication session can be by being carried by the first hazard detector 400 The tunnel of confession.In other embodiments, this communication channel can be by the second hazard detector 1002 It is established independently.Figure 18 diagram is according to the second hazard detector 1002 and cloud of some embodiments Pairing process between server 164.At this moment, the second hazard detector 1002 have been received by as SSID 1110 and LAN password 1112 described above.Second hazard detector 1002 energy Enough it is connected to Cloud Server 164 by home Wi-Fi network 1604, then by router 160 It is connected to internet 162 and Cloud Server 164.Then second hazard detector 1002 can make With configuration information described above (such as, account, account pairing token, DNS Host name etc.) match with user account 1004.In the future, user account 1004 is signed in as user Time, they are it will be seen that the first hazard detector 400 and the second hazard detector 1002 and also adopt Any other wired home device (such as, thermostat, family with user account 1004 registration Safety device, doorbell, intercom system etc.).In certain embodiments, Cloud Server 164 Account certificate 1118 can also be supplied to the second hazard detector 1002.Account certificate 1118 Then can be used for the future from mobile computing device 816 by the second hazard detector 1002 Communication is authenticated.As an alternative, the first hazard detector 400 can pass through local device network 1602 provide pair code 1802 to the second hazard detector 1002.Further, some are implemented Example can exchange cryptographic key (example between the second hazard detector 1002 and Cloud Server 164 Such as, symmetric key, public/private keys equity), enabling to the second hazard detector 1002 with Communication in future between Cloud Server 164 is encrypted.
At this moment, the second hazard detector 1002 is provided at home Wi-Fi network by (1) On 1604, (2) provide on local device network 1602, (3) use mobile computing device 816 are authenticated and user account 1004 that (4) are matched and added on Cloud Server 164. All these operation requires nothing more than several users of mobile computing device 816 and has inputted. In order to add the second hazard detector 1002, it is desirable to can select in the case of using at wired home device Select makeshift device (such as, the first hazard detector 400), and push away the first hazard detector 400 and the second user's load buttons in hazard detector 1002.Dangerous with for adding first The method 700 of detector 400 process contrast, user from must switch Wi-Fi network or Otherwise change mobile computing device 816 setting, input Wi-Fi password or any its The process that it is relatively cumbersome and error-prone.Needs are enter to add the second hazard detector 1002 Unique code be to readily use the camera on mobile computing device 816 or other optics Sensor carrys out the second device code 1120 via QR code scans.
As it has been described above, some embodiments can installed after device has been paired and provides Journey presents several additional step.Such as, some embodiments can allow a user to specify at shell The position that in 150, second hazard detector 1002 is installed in.This process can follow above figure The description of 8Q-8U, wherein user is presented with many optimum positions, such as child bedroom, rises Room, master bedroom, dining room, basement and/or analog, and be allowed to from predefined row Table selects.Additionally, user can be allowed to use the text of mobile computing device 816 to input Input customized locations.Can be used to distinguish by the position (such as kitchen) specified by user Other hazard detector in second hazard detector 1002 and shell 150.This position is all right " said " during operation by the second hazard detector 1002 when danger being detected and (such as, " carry Wake up, kitchen have cigarette ").
Figure 19 A-19C diagram has been used for the second hazard detector 1002 according to some embodiments Some optional final steps of installation.Figure 19 A allows user to enable or disable " street lamp " Feature.Some embodiments of second hazard detector 1002 can allow will be by the second dangerous inspection Survey device 1002 or fortune detected by the wired home device that another in local device network is neighbouring The LOIHT option of night-light it is used as time dynamic.Figure 19 B diagram can be in the second hazard detector 1002 just with at Cloud Server 164 user account 1004 match while display interface. Because described process relates to being communicated by internet, and because by the second hazard detector 1002 add user account 1004 to may spend more than one minute, it is possible to show this interface, User is known, and this process not yet completes but is still carrying out.
Figure 19 C diagram notice user setup process completes and successful interface.This interface also allows for User installs additional wired home device alternatively.If user selects to install another device, Then setting up procedure can be made further to rationalize.Use device, setting and/or the second danger is being set The network set up during the detector 1002 of danger connects, for the installation process of follow-up wired home device Scanning/input new equipment code may be limited to.Such as, user can buy by multiple sensor lists The new security system of unit's composition.Use this feature can be inputted with the user that minimum requires and come one Connect a ground and each in the sensor unit of security system is installed.By the side of example Formula, some embodiments can maintain the first hazard detector 400 and mobile computing device 816 it Between tunnel connect and simply the other end in this tunnel is connected to new equipment.First is dangerous Detector 400 can also allow its beacon stay in local device network so that user can be continuous Connect multiple device.Mobile computing device 816 is able to maintain that the copy of access token 1108, makes The device for each installation must be need not and resend it from Cloud Server 164.Additionally, SSID 1110, LAN password 1112 and/or device can be maintained on mobile computing device 816 The network information 1122, enabling send them to each new equipment to be added simply.
It is understood that, although the described hazard detector for installing and arrange the first networking And the method for hazard detector that second (with follow-up) networks is upper and lower at their specific device Literary composition aspect is particularly advantageous, but the problem that is because is probably and is alternatively using non-graphic but simple User interface element on single device visually introducing victory (such as, simply can be pressed and presses Button, colored light and audio loudspeaker) in the case of because lacking graphic user interface on full device (such as, lack there is touch screen capability or the dot matrix LCD screen of keypad/instruction ability) and draw Rise, and further in view of the power limit of the only situation of battery hazard detector, Yi Jijin One step in view of such device spatially and/or time the most limited upper wireless connectivity, this teaching Scope be not limited to hazard detection device.On the contrary, the described method being used for installing and arranging Be widely applicable for any one in the wired home device of various networking with system, such as above About those the wired home devices described by Fig. 1, and include but not limited to thermostat, ring Border sensor, motion sensor, take sensor, baby monitor, remote controllers, key Spoon remote controllers, wired home hub, safe keypad, biometric access controller, Other safety device, camera, microphone, loudspeaker, LED location based on the flight time/ Motion sensing array, doorbell, inside plant, intelligent light switch, intelligent door lock, Men Chuan Sensor, window sensor, general programmable wireless control button, include night-light and mood illumination Lighting apparatus, intelligent appliance, entertainment device, home-services robot, garage door open, Door opener, curtain controller, other mechanical actuation device, sun-generated electric power array, outdoor lead to Road illumination, irrigation equipment, lawn-care apparatus or other wired home device.Although widely Any one be applicable to these wired home devices, but in described method and system One or more it is likely to be of on more limited device user interface capabilities (such as, when being used in There is no graphic user interface) device back surface field scape under time, when be used in may be for power limited (such as, battery powered and be not attached to family expenses civil power) device scene under and/or Become increasingly when having spatially and/or under the device scene of time the most limited upper wireless connectivity Favorably.Each in the wired home device of network structure may need to be purchased at them Match, as first device or as second or follow-up with user account when buying and install Continue device.It is, therefore, to be understood that the first hazard detector 400 and/or the second hazard detection Device 1002 only represents can wired home that advantageously system and method with the present invention is used together The type of device.By non-limiting example, about continuing to provide, intelligent thermostat can be by It is used for providing and new security system device being installed.Hazard detector can be used to and install New gate control system.User can from available apparatus (such as intelligent appliance, intercom system, Intelligence baby monitor or intelligent thermostat) in the middle of select with provide and new gate control system is installed. Upon reading this disclosure, those skilled in the art can be easy according to method described above Ground replaces any one in these devices.
According to some embodiments, can present for making two or more hazard detector and use The method of family account pairing.The method can include that to set up first wireless with the first hazard detector Communication.First radio communication can use the first wireless protocols.First hazard detector may be first Before with user account match.The method can also include using the first wireless protocols to come to the One hazard detector sends instruction the first hazard detector in this first hazard detector and the second danger The transmission of the second radio communication is set up between the detector of danger.In the first hazard detector and the second danger The second radio communication set up between the detector of danger can use the second wireless protocols.The method can Additionally to include that using the first wireless protocols to come to the first hazard detector sends for the second danger Danger detector adds the network credentials of the first wireless protocols.The second wireless protocols can be used to demonstrate,prove Book is sent to the second hazard detector from the first hazard detector.The first wireless protocols can be used Set up the new pairing between the second hazard detector and user account.
In various embodiments, it is also possible to realize in following aspect is one or more.First nothing Wire protocol can be that 802.11Wi-Fi is compatible and the second wireless protocols can be IEEE 802.15.4 compatible.The method can also include by via by the first hazard detector offer Network is set up radio communication between the first hazard detector and calculating device and is set up the first danger Pairing between detector and user account, wherein can use the first wireless protocols to provide State network.Network credentials can by mobile computing device operation should be used for provide.The party Method can also include that geographical position based on the second hazard detector is that the second hazard detector is true Attribute is sayed.First hazard detector can use calculating device and the use of the first wireless protocols Data tunnel is set up between second hazard detector of the second wireless protocols.First hazard detector Transmission data between device and the second hazard detector can calculated by data tunnel.The party Method can also include: received the device code of the second hazard detector by calculating device;And it is logical Cross and via data tunnel, device code is sent to the second hazard detector and uses the second dangerous inspection Survey device and be authenticated calculating device.The method can additionally include: connects from account server Receive pair code;And use the first wireless protocols to come to the first hazard detector to send for the The pair code of two hazard detector.The second wireless protocols can be used from by pair code One hazard detector is sent to the second hazard detector.Pair code can allow the second dangerous inspection Survey device and the user account pairing at account server.The method can also include, by net Before network certificate is sent to the first hazard detector, receive network credentials from the first hazard detector.
According to some embodiments, can present for making two or more hazard detector and use The system of family account pairing.This system can be included on mobile computing device the application of operation. Application can be the configuration for two or more hazard detector and control and design.Should With being communicated with the central server including user account foundation by internet.Apply permissible It is configured to set up the first radio communication with the first hazard detector.First radio communication can make Use the first wireless protocols.First hazard detector may the most be matched with user account.Should Instruction the is sent with can be configured to use the first wireless protocols to come to the first hazard detector One hazard detector sets up the second nothing between this first hazard detector and second hazard detector The transmission of line communication.Second set up between the first hazard detector and the second hazard detector Radio communication can use the second wireless protocols.Application can additionally be configured to use first It is wireless that wireless protocols adds first to the first hazard detector transmission for the second hazard detector The network credentials of agreement.The second wireless protocols can be used from the first hazard detector by certificate It is sent to the second hazard detector.The first wireless protocols can be used to set up the second hazard detection New pairing between device and user account.
In various embodiments, it is also possible to realize in following aspect is one or more.First nothing Wire protocol can be that 802.11Wi-Fi is compatible and the second wireless protocols can be IEEE 802.15.4 compatible.Application can be configured to by providing via by the first hazard detector Network in the first hazard detector and calculate and set up radio communication between device and set up the first danger Pairing between danger detector and user account, wherein can use the first wireless protocols to provide Described network.Network credentials can by mobile computing device operation should be used for provide.Should It is the second hazard detection with can be configured to geographical position based on the second hazard detector Device determines language.First hazard detector can use the first wireless protocols calculating device with Use and set up data tunnel between the second hazard detector of the second wireless protocols.First dangerous inspection Survey device and can calculate transmission data between device and the second hazard detector by data tunnel. Application can be configured to: received the device code of the second hazard detector by calculating device; And use second by device code being sent to the second hazard detector via data tunnel Hazard detector is authenticated calculating device.Application can additionally be configured to: from account Server receives pair code;And use the first wireless protocols to send out to the first hazard detector Send the pair code for the second hazard detector.The second wireless protocols can be used to match Code is sent to the second hazard detector from the first hazard detector.Pair code can allow Two hazard detector and the user account pairing at account server.Application can also be configured Become, before network credentials is sent to the first hazard detector, connect from the first hazard detector Receive network credentials.
With reference next to Figure 20, the exemplary environments that can be used to realize embodiment is shown with energy Enough it is used for such as being equipped with biography according to one or more the remotely controlling in embodiment by user 2004 One or more computer system 2000 in the wired home device of sensor.Computer system 2010 can be used the process example based on server described by performing hereinbefore as an alternative In one or more or be used as be used for performing institute in large-scale distributed virtualization numerical procedure The processing means processing example described, or for various other purposes consistent with this teaching In any one.Computer system 2000 can include computer 2002, keyboard 2022, net Network router 2012, printer 2008 and monitor 2006.Monitor 2006, processor 2002 Being a part for computer system 2026 with keyboard 2022, described computer system 2026 is permissible It is laptop computer, desktop computer, handheld computer, host computer etc..Monitor 2006 can be CRT, flat screens etc..
User 2004 can use various input unit (such as mouse, keyboard 2022, track Ball, touch-screen etc.) input commands in computer 2002.If computer system 2000 Including main frame, then designer 2004 can use such as terminal or terminal interface to access computer 2002.Additionally, computer system 2026 can use may be coupled to internet 2018 or The network router 2012 of WAN is connected to printer 2008 and server 2010.
Server 2010 such as can be used to the additional software program of storage and data.At one In embodiment, it is achieved the software of system and method described herein can be stored in service On storage medium in device 2010.Therefore, it is possible to the storage medium fortune from server 2010 Row software.In another embodiment, it is achieved the software energy of system and method described herein Enough it is stored on the storage medium in computer 2002.Therefore, it is possible to from computer system 2026 In storage medium run software.Therefore, in this embodiment, no matter computer 2002 is The no network router 2012 that is connected to can use software.Printer 2008 can directly connect Receiving computer 2002, in the case, computer system 2026 can print whether it connects To network router 2012.
With reference to Figure 21, it is shown that the embodiment of dedicated computer system 2100.Such as, one Or multiple intelligent assembly can be dedicated computer system 2100.Said method can be counted by guiding Calculation machine system performs the computer program of the action of method described above and assembly and comes real Existing.Each such computer program can include being embodied in computer-readable medium On booting computer system processor perform respective action instruction (code) collection.Instruction May be configured in order order or concurrently (such as under different process threads) or Person runs according to a combination thereof.Computer program is being carried in general-purpose computing system 2126 After on, it is transformed into dedicated computer system 2100.
Dedicated computer system 2100 includes computer 2102, is couple to the prison of computer 2102 Visual organ 2106, it is couple to one or more additional user's output device 2130 of computer 2102 (optional), be couple to one or more user input apparatus 2140 of computer 2102 (such as, Keyboard, mouse, trace ball, touch-screen), be couple to the optional communication interface of computer 2102 2150, the computer program in the tangible computer readable memory in computer 2102 it is stored in Product 2105.Computer program 2105 guides system 2100 to perform method described above. Computer 2102 can include communicating with many peripheral units via bus subsystem 2190 One or more processors 2160.These peripheral units can include user's output device 2130, User input apparatus 2140, communication interface 2150 and storage subsystem, such as tangible meter The random access memory (RAM) 2170 of the form of calculation machine readable memory and non-volatile deposit Storage driver 2180 (such as, disc driver, CD drive, solid-state drive).
Computer program 2105 can be stored in can by computer 2102 access non-easily Lose property memory driver 2180 or another computer-readable medium in and be loaded into memory 2170 In.Each processor 2160 can include microprocessor, such as fromOr ultra micro partly leads Body companyDeng microprocessor.In order to support computer program 2105, computer 2102 Operation processes product 2105 and the communication of assembly indicated above and support indicated above calculates The operating system of the communication between the assembly of machine program product 2105.Exemplary operating system includes From MicrosoftFrom Sun MicrosystemsLINUX、 UNIX etc..
User input apparatus 2140 includes the institute for entering information into computer system 2102 The likely device of type and mechanism.These user input apparatus can include keyboard, keypad, Mouse, scanner, Digital Drawing plate, the touch-screen being attached in display, such as voice are known Other system, the voice input device of microphone and other type of input unit.In various realities Execute in example, user input apparatus 2140 be typically embodied as computer mouse, trace ball, with Track plate, joystick, Digiplex, drawing flat board, voice command system.User inputs dress Put 2140 to allow generally for user and select now supervision via the order of the click of such as button etc. Object on device 2106, icon, text etc..User's output device 2130 include by from based on Calculation machine 2102 export information the likely device of type and mechanism.These user's output devices Display (such as, monitor 2106), printer, such as audio output device can be included Non-visual display unit etc..
Communication interface 2150 provides other communication network and the interface of device, and can serve as For receiving data from other system, WAN and/or internet 2518 and to other system, WAN And/or internet 2518 sends the interface of data.The embodiment of communication interface 2150 generally includes Ethernet card, modem (phone, satellite, cable television, ISDN), (asynchronous) DSL (DSL) unit,Interface,Interface, wireless network are suitable Orchestration etc..Such as, communication interface 2150 can be couple to computer network, is couple to Bus etc..In other embodiments, communication interface 2150 can be integrated physically within computer On the motherboard of 1602, and/or it can be software program etc..
RAM 2170 and non-volatile memories driver 2180 be arranged to store such as this The data of bright computer program product embodiments (include computer executable code, Ren Leike Read code etc.) the example of tangible computer computer-readable recording medium.Other type of tangible computer can Read medium include floppy disk, the optical storage medium of mobile hard disk, such as CD-ROM, DVD, Bar code, such as flash memory, read-only storage (ROM), reserve battery volatibility are deposited The semiconductor memory of reservoir, networked storage devices etc..RAM 2170 and non-volatile memories Driver 2180 may be configured to storage and provides various embodiments of the present invention as above The basic programming of function and data configuration.
The software instruction collection providing the function of the present invention can be stored in RAM 2170 and Fei Yi In the property lost memory driver 2180.These instruction set or code can be performed by processor 2160. RAM 2170 and non-volatile memories driver 2180 can be provided for storage according to this Bright used data and the storage vault of data structure.RAM 2170 and non-volatile memories drive Device 2180 can include that comprising the master for storing instruction and data program the term of execution deposits at random The many of the read-only storage (ROM) of access to memory (RAM) and storage fixed instruction is deposited Reservoir.RAM 2170 and non-volatile memories driver 2180 can include offer program and/or The file storage subsystem that lasting (non-volatile) of data file stores.RAM 2170 and non- Volatile storage driver 2180 can also include removable storage system, such as may move flash Memory.
Bus subsystem 2190 provides various assemblies and subsystem for allowing computer 2102 The mechanism communicated with each other as expected.Although bus subsystem 2190 is schematically outlined For single bus, but in the alternative embodiment of bus subsystem can utilize computer 2102 Multiple buses or communication path.

Claims (20)

1. one kind is used for setting up wired home hazard detector and foundation at central server The method of the pairing between online management account, described online management account has related account Identifier, described method includes:
The configuration for described hazard detector and control is made to design at mobile computing device Application example, described application is communicated with the foundation of described central server by internet;
First code is received from described central server at described mobile computing device;
Receive at described mobile computing device printing surface from described hazard detector or Position is being set physically with the document printing of described hazard detector or the letter that is packaged to be Breath, described information includes second code;
By the broadcast of described hazard detector by the Wi-Fi access point of described hazard detector trustship SSID;
The selection to described access point SSID is received also from user at described mobile computing device And corresponding Wi-Fi connection is set up with described hazard detector, wherein said Wi-Fi connects use Described second code is authenticated;
Receiving described hazard detector at described mobile computing device will be for accessing described interconnection The identity of the home Wi-Fi network of net;
Described first code and institute is sent to described hazard detector from described mobile computing device State the described identity of home Wi-Fi network;
Described home Wi-Fi network is used to come and described central server by described hazard detector Set up data communication;And
Include the biography of described first code to the transmission of described central server by described hazard detector Defeated, wherein said transmission is stored in described by the use of described central server the most regularly Information in the memory of hazard detector is authenticated;
By described central server, the most described pairing is achieved in that (i) uses described Second code verifies the matching relationship pre-build;And (ii) is when described checking, makes institute State hazard detector to be associated with described account.
Method the most according to claim 1, wherein, described in described hazard detector Print surface or position is being set physically with the described printing literary composition of described hazard detector Shelves or include described second code encoding of graphs is quickly responded (QR) code.
Method the most according to claim 1, farther includes:
At described mobile computing device, receive the most described hazard detector will be installed in The described position that position is set;And
To be stored in described at spool to the transmission of described central server by described mobile computing device Described position at reason account.
Method the most according to claim 3, wherein, selected position include bedroom, Bathroom, home entertaining room, living room, child bedroom, master bedroom, guest bedroom or dining room.
Method the most according to claim 1, wherein, described second code is by with letter number Described printing surface that word format is printed in described hazard detector or physically with described On the described document printing of hazard detector or packaging.
Method the most according to claim 1, farther includes to be carried by described hazard detector It is used for beginning setting up described hazard detector for indicating described user to provide to described hazard detector And the verbal order of user's input of the process of the described pairing between described online management account.
Method the most according to claim 1, farther includes to be carried by described hazard detector For indicating described user to make the verbal order of described application example at described mobile device, its Described in order include for from application on site market download described application instruction.
Method the most according to claim 1, further includes at described mobile computing device Place receives configuration information from described central server, and wherein said configuration information includes so that described Hazard detector can set up or add the information of local device network compatible for 802.15.4.
Method the most according to claim 1, further includes at described family Wi-Fi net The described identity of network is deleted from described mobile computing device after being sent to described hazard detector The described identity of described home Wi-Fi network.
Method the most according to claim 1, farther includes by described hazard detector It is stored in described danger during sending to described central server after using during manufacture or manufacturing Cryptographic key on the detector of danger and/or the authentication information that generates of certificate.
11. 1 kinds for setting up wired home hazard detector and foundation at central server The system of the pairing between online management account, described online management account has related account Identifier, described system includes:
The application of operation on mobile computing device, wherein, described application is for described danger Configuration and the control of detector and design, described application is by internet and described central service Communication set up by device, and wherein, described application is configured to:
First code is received from described central server;
Receive the printing surface from described hazard detector or position physics is being set The upper document printing with described hazard detector or the information being packaged to be, described information Including second code;
Receive the selection aligning the access point SSID broadcasted by described hazard detector, institute State and select to be to receive from user and set up corresponding Wi-Fi with described hazard detector Connecting, wherein said Wi-Fi connects the described second code of use and is authenticated;
Receive described hazard detector by the family's Wi-Fi net for accessing described internet The identity of network;And
Described first code and described family Wi-Fi net is sent to described hazard detector The described identity of network;And
Described hazard detector, wherein said hazard detector is configured to:
Receive the user's input for starting described pairing;
Broadcast described Wi-Fi access point SSID;
Described second code is used to come the company to described Wi-Fi access point by described application Connect and be authenticated;
Described first code and the institute of described home Wi-Fi network is received from described application State identity;
Use described home Wi-Fi network to set up data with described central server to lead to Letter;And
The transmission including described first code is sent to described central server, wherein said Transmit to be used by described central server and be stored in described hazard detection the most regularly Information in the memory of device is authenticated;
By described central server, the most described pairing is achieved in that (i) uses Described second code verifies the matching relationship pre-build;And (ii) is in described checking Time, make described hazard detector be associated with described account.
12. systems according to claim 11, wherein, the institute in described hazard detector State printing surface or position is being set physically with the described printing of described hazard detector Document or packaging include quickly response (QR) code to described second code encoding of graphs.
13. systems according to claim 11, wherein, described application is further configured Become:
Receive the most described hazard detector and will be installed in the described position that position is set Put;And
Send to described central server and to be stored in the institute's rheme at described online management account Put.
14. systems according to claim 13, wherein, selected position include bedroom, Bathroom, home entertaining room, living room, child bedroom, master bedroom, guest bedroom or dining room.
15. systems according to claim 11, wherein, described second code is by with letter Described printing surface that number format is printed in described hazard detector or physically with institute State in described document printing or the packaging of hazard detector.
16. systems according to claim 11, wherein, described hazard detector is further It is configured to provide and indicates described user to provide described for beginning setting up to described hazard detector User's input of the process of the described pairing between hazard detector and described online management account Verbal order.
17. systems according to claim 11, wherein, described hazard detector is further It is configured to provide the mouth indicating described user to make described application example at described mobile device Head order, wherein said order includes the instruction for downloading described application from application on site market.
18. systems according to claim 11, wherein, described application is further configured Becoming and receive configuration information from described central server, wherein, described configuration information includes so that institute State hazard detector and can set up or add the information of local device network compatible for 802.15.4.
19. systems according to claim 11, wherein, described application is further configured Become to delete after the described identity of described home Wi-Fi network is sent to described hazard detector Described identity except described home Wi-Fi network.
20. systems according to claim 11, wherein, described hazard detector is further Store during being configured to after the transmission of described central server uses during manufacture or manufactures The authentication information that cryptographic key in described hazard detector and/or certificate generate.
CN201480064784.2A 2013-10-07 2014-10-07 For establishing wired home device and online management account matching method and system Active CN105794170B (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US201361887969P 2013-10-07 2013-10-07
US61/887,969 2013-10-07
US14/508,612 US9049567B2 (en) 2013-10-07 2014-10-07 Hazard detection unit facilitating user-friendly setup experience
US14/508,612 2014-10-07
PCT/US2014/059498 WO2015054254A1 (en) 2013-10-07 2014-10-07 Hazard detection unit facilitating user-friendly setup experience

Publications (2)

Publication Number Publication Date
CN105794170A true CN105794170A (en) 2016-07-20
CN105794170B CN105794170B (en) 2019-11-15

Family

ID=52776498

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480064784.2A Active CN105794170B (en) 2013-10-07 2014-10-07 For establishing wired home device and online management account matching method and system

Country Status (5)

Country Link
US (5) US9332040B2 (en)
EP (2) EP3055974B1 (en)
CN (1) CN105794170B (en)
CA (2) CA2926459C (en)
WO (1) WO2015054254A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106325245A (en) * 2016-08-18 2017-01-11 广州市迪士普音响科技有限公司 Control method and control system of wisdom platform
CN108966258A (en) * 2017-05-18 2018-12-07 霍尼韦尔国际公司 System and method for correcting the network connectivity of connection equipment
CN109168181A (en) * 2018-09-14 2019-01-08 珠海奔图电子有限公司 A kind of method and apparatus of the network connection of controlling terminal
CN111752443A (en) * 2019-03-28 2020-10-09 华为技术有限公司 Method, related device and system for controlling page by display equipment
CN113835777A (en) * 2017-02-17 2021-12-24 谷歌有限责任公司 Mobile application activity detector

Families Citing this family (193)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6686838B1 (en) * 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
US9599981B2 (en) 2010-02-04 2017-03-21 Echostar Uk Holdings Limited Electronic appliance status notification via a home entertainment system
US20120251963A1 (en) * 2011-03-31 2012-10-04 Siemens Industry, Inc. Thermostat with integrated carbon monoxide (co) sensor
US9718371B2 (en) 2011-06-30 2017-08-01 International Business Machines Corporation Recharging of battery electric vehicles on a smart electrical grid system
KR20130096978A (en) * 2012-02-23 2013-09-02 삼성전자주식회사 User terminal device, server, information providing system based on situation and method thereof
JP2013257212A (en) * 2012-06-12 2013-12-26 Ricoh Co Ltd Light device, communication device and positional information management system
US9959717B2 (en) * 2013-05-17 2018-05-01 Networked Emergency Systems Inc. Security and first-responder emergency lighting system
US9451464B2 (en) * 2013-09-11 2016-09-20 Tencent Technology (Shenzhen) Company Limited Method, apparatus and system for network access
KR101687340B1 (en) * 2013-09-12 2016-12-16 주식회사 케이티 Method for setting home network operating environment and apparatus therefor
WO2015054278A1 (en) * 2013-10-07 2015-04-16 Google Inc. Smart-home hazard detector providing useful follow up communications to detection events
US9332040B2 (en) 2013-10-07 2016-05-03 Google Inc. Hazard detection unit facilitating convenient setup of plural instances thereof in the smart home
KR101593115B1 (en) 2013-10-15 2016-02-11 주식회사 케이티 Method for monitoring legacy device status in home network system and home network system
US20150121470A1 (en) * 2013-10-25 2015-04-30 Qualcomm Incorporated Peer-to-peer onboarding of internet of things (iot) devices over various communication interfaces
US9900177B2 (en) 2013-12-11 2018-02-20 Echostar Technologies International Corporation Maintaining up-to-date home automation models
CN113203168A (en) 2013-12-11 2021-08-03 霍尼韦尔国际公司 Automatic control system for building
US9495860B2 (en) 2013-12-11 2016-11-15 Echostar Technologies L.L.C. False alarm identification
US9772612B2 (en) 2013-12-11 2017-09-26 Echostar Technologies International Corporation Home monitoring and control
US9769522B2 (en) 2013-12-16 2017-09-19 Echostar Technologies L.L.C. Methods and systems for location specific operations
KR102210823B1 (en) * 2013-12-20 2021-02-02 삼성전자 주식회사 Method and apparatus of communication for smart home devices
WO2015093906A1 (en) 2013-12-20 2015-06-25 삼성전자 주식회사 Connection method for smart home device and apparatus thereof
US20150187194A1 (en) * 2013-12-29 2015-07-02 Keanu Hypolite Device, system, and method of smoke and hazard detection
US9635108B2 (en) 2014-01-25 2017-04-25 Q Technologies Inc. Systems and methods for content sharing using uniquely generated idenifiers
US9900919B1 (en) * 2014-03-19 2018-02-20 Amazon Technologies, Inc. Adaptive beacon rate system
CA2886531A1 (en) * 2014-03-27 2015-09-27 Braeburn Systems, Llc Thermostat code input system and method therefor
US9723393B2 (en) 2014-03-28 2017-08-01 Echostar Technologies L.L.C. Methods to conserve remote batteries
US9754090B2 (en) 2014-05-07 2017-09-05 Vivint, Inc. Setting up a system with a mobile device
US9590857B2 (en) * 2014-05-19 2017-03-07 Comcast Cable Communications, Llc Device provisioning
WO2016005805A1 (en) 2014-07-06 2016-01-14 Universal Site Monitoring Unit Trust Personal hazard detection system with redundant position registration and communication
US9942756B2 (en) 2014-07-17 2018-04-10 Cirrent, Inc. Securing credential distribution
US10834592B2 (en) 2014-07-17 2020-11-10 Cirrent, Inc. Securing credential distribution
US10154409B2 (en) 2014-07-17 2018-12-11 Cirrent, Inc. Binding an authenticated user with a wireless device
US10356651B2 (en) 2014-07-17 2019-07-16 Cirrent, Inc. Controlled connection of a wireless device to a network
US11085455B1 (en) * 2014-08-11 2021-08-10 Delta T, Llc System for regulating airflow associated with product for sale
US9621959B2 (en) 2014-08-27 2017-04-11 Echostar Uk Holdings Limited In-residence track and alert
US9824578B2 (en) 2014-09-03 2017-11-21 Echostar Technologies International Corporation Home automation control using context sensitive menus
US9989507B2 (en) 2014-09-25 2018-06-05 Echostar Technologies International Corporation Detection and prevention of toxic gas
DE102014219763A1 (en) * 2014-09-30 2016-03-31 Robert Bosch Gmbh Method and device for commissioning a smart home device
USD771646S1 (en) * 2014-09-30 2016-11-15 Apple Inc. Display screen or portion thereof with graphical user interface
US20160117776A1 (en) * 2014-10-24 2016-04-28 Swyfft, Llc Method and system for providing accurate estimates
US9511259B2 (en) 2014-10-30 2016-12-06 Echostar Uk Holdings Limited Fitness overlay and incorporation for home automation system
US9983011B2 (en) 2014-10-30 2018-05-29 Echostar Technologies International Corporation Mapping and facilitating evacuation routes in emergency situations
US9967614B2 (en) 2014-12-29 2018-05-08 Echostar Technologies International Corporation Alert suspension for home automation system
US9872088B2 (en) 2015-03-05 2018-01-16 Google Llc Monitoring and reporting household activities in the smart home according to a household policy
US9998803B2 (en) * 2015-03-05 2018-06-12 Google Llc Generation and implementation of household policies for the smart home
US10114351B2 (en) 2015-03-05 2018-10-30 Google Llc Smart-home automation system that suggests or autmatically implements selected household policies based on sensed observations
US9728071B2 (en) * 2015-03-12 2017-08-08 Honeywell International Inc. Method of performing sensor operations based on their relative location with respect to a user
USD779543S1 (en) * 2015-03-20 2017-02-21 Ahtovation, Inc. Display screen or portion thereof with graphical user interface
US9729989B2 (en) 2015-03-27 2017-08-08 Echostar Technologies L.L.C. Home automation sound detection and positioning
US10154017B2 (en) * 2015-04-30 2018-12-11 Mcafee, Llc Device pairing in a local network
US9948477B2 (en) 2015-05-12 2018-04-17 Echostar Technologies International Corporation Home automation weather detection
US9946857B2 (en) * 2015-05-12 2018-04-17 Echostar Technologies International Corporation Restricted access for home automation system
US9689853B2 (en) * 2015-05-15 2017-06-27 Google Inc. Visual buffering element for hazard detector internal components
US9632746B2 (en) 2015-05-18 2017-04-25 Echostar Technologies L.L.C. Automatic muting
US11749249B2 (en) 2015-05-29 2023-09-05 Sound United, Llc. System and method for integrating a home media system and other home systems
US10657949B2 (en) * 2015-05-29 2020-05-19 Sound United, LLC System and method for integrating a home media system and other home systems
USD803241S1 (en) 2015-06-14 2017-11-21 Google Inc. Display screen with animated graphical user interface for an alert screen
US9361011B1 (en) 2015-06-14 2016-06-07 Google Inc. Methods and systems for presenting multiple live video feeds in a user interface
US10133443B2 (en) 2015-06-14 2018-11-20 Google Llc Systems and methods for smart home automation using a multifunction status and entry point icon
USD812076S1 (en) 2015-06-14 2018-03-06 Google Llc Display screen with graphical user interface for monitoring remote video camera
FR3038114B1 (en) * 2015-06-25 2020-02-14 Thoonsen Trading MONITORING OR CALLING SYSTEM BY CALL TERMINAL
US9930641B2 (en) * 2015-07-09 2018-03-27 Honeywell International Inc. Automated and adaptive channel selection algorithm based on least noise and least density of wireless sensors network in neighborhood
US11240056B2 (en) 2015-07-13 2022-02-01 Carrier Corporation Safety automation system
US20170048310A1 (en) * 2015-08-14 2017-02-16 Google Inc. Peer-to-peer enabled activation
US9960980B2 (en) 2015-08-21 2018-05-01 Echostar Technologies International Corporation Location monitor and device cloning
CN105207790A (en) * 2015-08-29 2015-12-30 宇龙计算机通信科技(深圳)有限公司 Information processing method, device and system
KR20170029869A (en) * 2015-09-08 2017-03-16 삼성전자주식회사 Method and apparatus of indoor device management
US10257198B2 (en) * 2015-09-11 2019-04-09 Arris Enterprises Llc Password input method for devices with limited user interface
US10567962B1 (en) * 2015-09-11 2020-02-18 Symantec Corporation Systems and methods for connecting internet-connected devices to wireless access points
US9883456B2 (en) 2015-09-16 2018-01-30 Microsoft Technology Licensing, Llc. Application specific internet access
US9953511B2 (en) * 2015-09-16 2018-04-24 Honeywell International Inc. Portable security device that communicates with home security system monitoring service
US10318097B2 (en) * 2015-09-22 2019-06-11 Klipsch Group, Inc. Bass management for home theater speaker system and hub
US11122041B2 (en) * 2015-09-25 2021-09-14 Siemens Industry, Inc. System and method for location-based credentialing
US10417295B2 (en) * 2015-10-20 2019-09-17 At&T Intellectual Property I, L.P. Sensory allegiance
JP6688954B2 (en) * 2015-11-18 2020-04-28 パナソニックIpマネジメント株式会社 Message receiving device and screen transition method
US9996066B2 (en) 2015-11-25 2018-06-12 Echostar Technologies International Corporation System and method for HVAC health monitoring using a television receiver
US10101717B2 (en) 2015-12-15 2018-10-16 Echostar Technologies International Corporation Home automation data storage system and methods
US9798309B2 (en) 2015-12-18 2017-10-24 Echostar Technologies International Corporation Home automation control based on individual profiling using audio sensor data
KR102254699B1 (en) * 2015-12-29 2021-05-24 삼성전자주식회사 User terminal apparatus and control method thereof
US10091017B2 (en) 2015-12-30 2018-10-02 Echostar Technologies International Corporation Personalized home automation control based on individualized profiling
US10060644B2 (en) 2015-12-31 2018-08-28 Echostar Technologies International Corporation Methods and systems for control of home automation activity based on user preferences
US10073428B2 (en) 2015-12-31 2018-09-11 Echostar Technologies International Corporation Methods and systems for control of home automation activity based on user characteristics
WO2017115145A1 (en) 2015-12-31 2017-07-06 Delta Faucet Company Water sensor
US10545466B2 (en) * 2016-01-19 2020-01-28 Honeywell International Inc. System for auto-adjustment of gateway poll rates
FR3047374B1 (en) 2016-01-28 2018-07-27 Overkiz METHOD FOR CONFIGURING, CONTROLLING OR SUPERVISING A DOMOTIC FACILITY
US9628286B1 (en) 2016-02-23 2017-04-18 Echostar Technologies L.L.C. Television receiver and home automation system and methods to associate data with nearby people
CN109391634A (en) * 2016-03-02 2019-02-26 上海小蚁科技有限公司 Establish method, terminal and the computer readable storage medium of communication
CN108781406B (en) * 2016-03-14 2021-09-07 罗伯特·博世有限公司 Wireless access point for intercom system and method of routing audio stream data
JP6407190B2 (en) * 2016-03-24 2018-10-17 キヤノン株式会社 COMMUNICATION DEVICE, COMMUNICATION DEVICE CONTROL METHOD, AND PROGRAM
US20170284690A1 (en) * 2016-04-01 2017-10-05 Softarex Technologies, Inc. Mobile environment monitoring system
US10034158B2 (en) * 2016-04-22 2018-07-24 Electronics And Telecommunications Research Institute Method of maintaining internet protocol (IP) connectivity in low power internet of things (IoT) communication device based on near field communication (NFC), and device operating the same
KR102505846B1 (en) * 2016-04-22 2023-03-06 한국전자통신연구원 METHOD OF MAINTAINING IP CONNECTIVITY AT LOW-POWER IoT COMMUNICATION DEVICE BASED ON NFC, AND AN DEVICE PERFORMING THE SAME
CN107371219B (en) * 2016-05-13 2020-08-25 华为终端有限公司 WiFi configuration method, WiFi mobile terminal and WiFi equipment
US10609581B2 (en) 2016-06-03 2020-03-31 Samsung Electronics Co., Ltd Method and apparatus for setup of wireless communication
WO2017209573A1 (en) 2016-06-03 2017-12-07 Samsung Electronics Co., Ltd. Multi-point content transmission method and apparatus
US9882736B2 (en) 2016-06-09 2018-01-30 Echostar Technologies International Corporation Remote sound generation for a home automation system
EP3476093B1 (en) * 2016-06-28 2020-06-17 Robert Bosch GmbH System and method for delegating ticket authentication to a star network in the internet of things and services
US10121353B1 (en) * 2016-06-28 2018-11-06 United Services Automobile Association (Usaa) Water detection assembly
US10037442B2 (en) * 2016-07-06 2018-07-31 Szu Chi Lo Anti-copy electronic device
USD882583S1 (en) * 2016-07-12 2020-04-28 Google Llc Display screen with graphical user interface
US10263802B2 (en) 2016-07-12 2019-04-16 Google Llc Methods and devices for establishing connections with remote cameras
US11156375B2 (en) 2016-07-22 2021-10-26 Ademco Inc. Migration of settings from a non-connected building controller to another building controller
US10488062B2 (en) 2016-07-22 2019-11-26 Ademco Inc. Geofence plus schedule for a building controller
US10294600B2 (en) 2016-08-05 2019-05-21 Echostar Technologies International Corporation Remote detection of washer/dryer operation/fault condition
US10880284B1 (en) * 2016-08-19 2020-12-29 Amazon Technologies, Inc. Repurposing limited functionality devices as authentication factors
US10049515B2 (en) 2016-08-24 2018-08-14 Echostar Technologies International Corporation Trusted user identification and management for home automation systems
US10176687B2 (en) * 2016-09-07 2019-01-08 Spectrum Brands, Inc. Smart lock for home automation
EP3531386B1 (en) * 2016-10-24 2024-06-12 Hochiki Corporation Fire monitoring system
US11238290B2 (en) 2016-10-26 2022-02-01 Google Llc Timeline-video relationship processing for alert events
USD843398S1 (en) 2016-10-26 2019-03-19 Google Llc Display screen with graphical user interface for a timeline-video relationship presentation for alert events
US10386999B2 (en) 2016-10-26 2019-08-20 Google Llc Timeline-video relationship presentation for alert events
CN106502113B (en) 2016-11-09 2020-05-29 中磊电子(苏州)有限公司 Automatic pairing method and server
EP3542297A4 (en) * 2016-11-16 2020-07-29 Golan, Meir System, methods and software for user authentication
EP3537652B1 (en) * 2016-11-26 2022-08-31 Huawei Technologies Co., Ltd. Method for securely controlling smart home appliance and terminal device
KR20180065428A (en) * 2016-12-07 2018-06-18 삼성전자주식회사 Apparatus and method for registering device on the cloud server
CN106789255B (en) * 2016-12-23 2021-07-06 九阳股份有限公司 Automatic network access control method for intelligent household electrical appliance
FR3061400A1 (en) 2016-12-28 2018-06-29 Overkiz METHOD FOR CONFIGURING ACCESS, CONTROL AND REMOTE SUPERVISION OF AT LEAST ONE DOMOTIC DEVICE BELONGING TO A DOMOTIC INSTALLATION
FR3061390B1 (en) 2016-12-28 2022-12-16 Overkiz METHOD FOR CONFIGURING, CONTROL OR SUPERVISION OF A HOME AUTOMATION INSTALLATION
FR3061399B1 (en) 2016-12-28 2023-04-21 Overkiz METHOD FOR CONFIGURING ACCESS, CONTROL AND REMOTE SUPERVISION OF AT LEAST ONE HOME AUTOMATION DEVICE BELONGING TO A HOME AUTOMATION INSTALLATION
US9922478B1 (en) * 2016-12-28 2018-03-20 Nortek Security & Control Llc Pressing device for garage door controller
WO2018153028A1 (en) * 2017-02-27 2018-08-30 华为技术有限公司 Method and apparatus for establishing wireless local area network connection and terminal
WO2018164486A1 (en) * 2017-03-08 2018-09-13 삼성전자주식회사 Electronic device and method for controlling wireless communication connection thereof
DE102017107088A1 (en) * 2017-04-03 2018-10-04 Vorwerk & Co. Interholding Gmbh A method of connecting a home appliance to a home wireless network
KR102314690B1 (en) 2017-04-11 2021-10-20 삼성전자주식회사 Device And Communication Connection Method Thereof
US10057125B1 (en) * 2017-04-17 2018-08-21 Essential Products, Inc. Voice-enabled home setup
US10250692B2 (en) 2017-04-21 2019-04-02 Sony Corporation Voice user interface for pairing between devices
US10547613B1 (en) 2017-05-17 2020-01-28 Amazon Technologies, Inc. Simplified association of devices with a network using unique codes on the devices and side channel communication
USD878402S1 (en) * 2017-05-22 2020-03-17 Subsplash Ip, Llc Display screen or portion thereof with transitional graphical user interface
USD883300S1 (en) * 2017-05-22 2020-05-05 Subsplash Ip, Llc Display screen or portion thereof with graphical user interface
USD878386S1 (en) * 2017-05-22 2020-03-17 Subsplash Ip, Llc Display screen or portion thereof with transitional graphical user interface
US10819921B2 (en) 2017-05-25 2020-10-27 Google Llc Camera assembly having a single-piece cover element
US10972685B2 (en) 2017-05-25 2021-04-06 Google Llc Video camera assembly having an IR reflector
US10683962B2 (en) 2017-05-25 2020-06-16 Google Llc Thermal management for a compact electronic device
US20180344116A1 (en) 2017-06-02 2018-12-06 Irobot Corporation Scheduling and control system for autonomous robots
US10983753B2 (en) 2017-06-09 2021-04-20 International Business Machines Corporation Cognitive and interactive sensor based smart home solution
EP3419194A1 (en) 2017-06-19 2018-12-26 Vestel Elektronik Sanayi ve Ticaret A.S. Method, device and computer program for transmitting and obtaining network credentials
EP3328000B1 (en) * 2017-06-22 2019-07-10 Sisteplast PVC, S.L. Home automation control device and control method thereof
WO2019014112A1 (en) * 2017-07-10 2019-01-17 Carrier Corporation Hazard detector with optical status indicator
US11240854B2 (en) 2017-08-22 2022-02-01 AI Incorporated Methods and systems for pairing mobile robotic device docking stations with a wireless router and cloud service
US10805869B2 (en) * 2017-08-25 2020-10-13 Qualcomm Incorporated Techniques and apparatuses for search, measurement, and icon display in new radio non-standalone mode
US11100922B1 (en) * 2017-09-26 2021-08-24 Amazon Technologies, Inc. System and methods for triggering sequences of operations based on voice commands
CN107770881A (en) 2017-10-27 2018-03-06 三星(中国)半导体有限公司 Transmit the method and device of data
US11196831B2 (en) * 2017-10-31 2021-12-07 Canon Kabushiki Kaisha Communication apparatus, communication method, and storage medium
KR102385263B1 (en) * 2018-01-04 2022-04-12 삼성전자주식회사 Mobile home robot and controlling method of the mobile home robot
DE102018100840A1 (en) * 2018-01-16 2019-07-18 Miele & Cie. Kg Method for improved integration of a WLAN-enabled household appliance in a user environment
CN110099393B (en) * 2018-01-30 2022-06-21 阿里巴巴集团控股有限公司 Method, device and system for monitoring network access state of distribution network equipment
CN108429661B (en) * 2018-02-09 2020-11-24 深圳绿米联创科技有限公司 Intelligent household equipment configuration information transfer method and system
US10587400B2 (en) * 2018-02-12 2020-03-10 Afero, Inc. System and method for securely configuring a new device with network credentials
US11868917B1 (en) 2018-03-21 2024-01-09 Amazon Technologies, Inc. Sensor-based door lock confidence
US10911224B1 (en) * 2018-03-21 2021-02-02 Amazon Technologies, Inc. Secure network-enabled lock
KR101980039B1 (en) * 2018-03-26 2019-05-17 엘지전자 주식회사 Automatically registration system and method for home appliances
CN108449758A (en) * 2018-03-27 2018-08-24 四川斐讯信息技术有限公司 A kind of binding method and system of Intelligent hardware
US10825313B2 (en) * 2018-03-30 2020-11-03 Carrier Corporation Hazard detector with optical status indicator
US12094326B2 (en) 2018-03-30 2024-09-17 Carrier Corporation Lens for a visual alarm detector
US10733179B2 (en) 2018-04-04 2020-08-04 Schlage Lock Company Llc Access control with multiple security ecosystems
US20190320039A1 (en) * 2018-04-13 2019-10-17 Mastercard International Incorporated Systems and methods for use in providing digital identities
US20190332558A1 (en) * 2018-04-25 2019-10-31 Qualcomm Incorporated Low-power states in a multi-protocol tunneling environment
CA3101356A1 (en) * 2018-05-29 2019-12-05 Autronica Fire & Security As Hazard detector socket
USD918930S1 (en) * 2018-06-06 2021-05-11 Lyft, Inc. Display screen or portion thereof with a graphical user interface
TWI695645B (en) * 2018-07-06 2020-06-01 小白投資有限公司 Wireless network identification method
US10659548B2 (en) * 2018-07-23 2020-05-19 NRS Systems Invocation devices in an organization information distribution system
CN108682124A (en) * 2018-08-28 2018-10-19 吕飞 Method for early warning and device
US10990261B2 (en) 2018-10-31 2021-04-27 Trane International Inc. HVAC graphical user interface with visual obscurity and methods of use thereof
US10900687B2 (en) 2018-10-31 2021-01-26 Trane International Inc. Flexible scheduling HVAC graphical user interface and methods of use thereof
US12015498B1 (en) * 2018-11-09 2024-06-18 Amazon Technologies, Inc. Electronic device configuration using dummy devices
CN109474595B (en) * 2018-11-13 2022-09-20 京东方科技集团股份有限公司 Electronic equipment binding method, electronic equipment, mobile terminal and server
KR102079324B1 (en) * 2018-11-20 2020-02-19 주식회사 세나테크놀로지 Group pairing method of wireless intercom system
US10847001B2 (en) * 2018-11-20 2020-11-24 Wireless Id Llc Systems to detect the presence of intruder devices in a home environment
US20200187006A1 (en) * 2018-12-06 2020-06-11 Whirlpool Corporation Communication system and method for authorizing an appliance
US10938558B2 (en) * 2018-12-17 2021-03-02 Zebra Technologies Corporation Authentication for connecting a barcode reader to a client computing device
EP3906697A4 (en) * 2018-12-31 2022-08-17 LG Electronics Inc. Wireless communication connection system including mobile terminal and electronic device to perform wireless communication connection through mobile terminal
US10553085B1 (en) * 2019-01-25 2020-02-04 Lghorizon, Llc Home emergency guidance and advisement system
CN111506319A (en) * 2019-01-31 2020-08-07 朗德万斯公司 Method for printing Zigbee installation code and corresponding system and equipment
WO2020162957A1 (en) * 2019-02-05 2020-08-13 Johnson Controls Fire Protection LP Capacitive switch detector addressing
US11056074B2 (en) * 2019-02-13 2021-07-06 Kinestral Technologies, Inc. Cloud-based component linking in a smart window system
KR20200102678A (en) 2019-02-22 2020-09-01 삼성전자주식회사 Apparatus and method for controlling signal related to external device
DE102019205187A1 (en) * 2019-04-11 2020-10-15 Robert Bosch Gmbh Alarm detector, alarm detector network and method for setting up an alarm detector network
US20200410791A1 (en) * 2019-06-25 2020-12-31 Scientia Potentia Est, LLC. Site supervisor system for construction sites
US11259348B2 (en) * 2019-08-14 2022-02-22 Sling Media Pvt. Ltd. Remote wireless network setup without pairing
DE102019122514A1 (en) * 2019-08-21 2021-02-25 LUPUS-ELECTRONICS GmbH Procedure for assigning a smoke alarm to be registered and a corresponding smoke alarm management system
US11265690B2 (en) 2019-09-13 2022-03-01 Sling Media L.L.C. Ecosystem-based wireless network setup
EP3825972B1 (en) * 2019-11-20 2023-03-08 Reinhard Muth Smoke detection system
GB2613947A (en) * 2020-04-01 2023-06-21 Shipshape Solutions Inc Home health optimization
JP2021167993A (en) * 2020-04-09 2021-10-21 富士フイルムビジネスイノベーション株式会社 Information processing device and program
WO2022003409A1 (en) * 2020-06-29 2022-01-06 Rajesh Bose Smart inventory management system based on embedded electronics, cloud computing and iot for the construction sector
CA3186695A1 (en) * 2020-07-24 2022-01-27 Nethravathi REDDY System and method for smart device management
WO2022060506A1 (en) * 2020-09-18 2022-03-24 Arris Enterprises Llc Voice based interface for residential gateways and access point devices
US20220125006A1 (en) 2020-10-23 2022-04-28 Automated Pet Care Products, Llc Ergonomic litter device
US11627011B1 (en) * 2020-11-04 2023-04-11 T-Mobile Innovations Llc Smart device network provisioning
US11855991B1 (en) * 2020-12-02 2023-12-26 Vivint, Inc. Management of a smart home automation community
CN112364272B (en) * 2021-01-13 2021-07-16 统信软件技术有限公司 Interaction method, system and computing equipment
CN115077186A (en) * 2021-03-10 2022-09-20 松下电器研究开发(苏州)有限公司 Refrigerator
WO2023076627A1 (en) * 2021-10-28 2023-05-04 Noiseaware Inc. System and method for monitoring and classifying smoking events in monitored spaces
US11903027B2 (en) * 2021-12-17 2024-02-13 Apple Inc. Systems and methods for reducing occurrence of data collisions in wireless networks

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050253709A1 (en) * 2004-05-14 2005-11-17 Baker Paul J Hazardous condition detector with integral wireless connectivity infrastructure device
US20090077623A1 (en) * 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
WO2012092627A1 (en) * 2010-12-31 2012-07-05 Nest Labs, Inc. Auto-configuring time-of-day for building control unit
CN102954564A (en) * 2012-11-23 2013-03-06 四川长虹电器股份有限公司 Control method for air conditioner
CN102985915A (en) * 2010-05-10 2013-03-20 网际网路控制架构网络有限公司 Control system user interface
US20130154823A1 (en) * 2011-12-20 2013-06-20 L&O Wireless, Inc. Alarm Detection and Notification System
CN103221985A (en) * 2010-09-24 2013-07-24 Xped控股股份有限公司 Remote control and remote control systems

Family Cites Families (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5686896A (en) 1995-09-28 1997-11-11 Interactive Technologies, Inc. Low battery report inhibitor for a sensor
US6166633A (en) 1999-05-21 2000-12-26 Wang; Randall Process for reducing motion-type false alarm of security alarm system with self-analyzing and self-adjusting control
US6686838B1 (en) 2000-09-06 2004-02-03 Xanboo Inc. Systems and methods for the automatic registration of devices
WO2003015450A1 (en) 2001-08-08 2003-02-20 Matsushita Electric Industrial Co., Ltd. Device control apparatus and device control system
US6873256B2 (en) * 2002-06-21 2005-03-29 Dorothy Lemelson Intelligent building alarm
JP4107902B2 (en) * 2002-07-26 2008-06-25 富士通テン株式会社 Security device
JP4660100B2 (en) 2004-02-26 2011-03-30 三洋電機株式会社 Server device
US7126487B2 (en) 2004-10-15 2006-10-24 Ranco Incorporated Of Delaware Circuit and method for prioritization of hazardous condition messages for interconnected hazardous condition detectors
US7768414B2 (en) 2005-05-25 2010-08-03 Beacon Medical Products Llc Medical gas alarm system
US8619623B2 (en) * 2006-08-08 2013-12-31 Marvell World Trade Ltd. Ad-hoc simple configuration
US8542665B2 (en) * 2007-08-06 2013-09-24 Sony Corporation System and method for network setup of wireless device through a single interface
US20090260064A1 (en) * 2008-04-15 2009-10-15 Problem Resolution Enterprise, Llc Method and process for registering a device to verify transactions
US20110057806A1 (en) 2009-09-09 2011-03-10 Universal Security Instruments, Inc Hazardous Condition Detector with Hardware Hush
US8588990B2 (en) * 2011-06-30 2013-11-19 Ayla Networks, Inc. Communicating through a server between appliances and applications
CN103890667B (en) 2011-10-21 2017-02-15 谷歌公司 User-friendly, network connected learning thermostat and related systems and methods
DE102012200714A1 (en) * 2012-01-19 2013-07-25 BSH Bosch und Siemens Hausgeräte GmbH A method of data communication between a home appliance and a user terminal, home appliance and system comprising a home appliance and a user terminal
US9143402B2 (en) * 2012-02-24 2015-09-22 Qualcomm Incorporated Sensor based configuration and control of network devices
US9351094B2 (en) 2012-03-14 2016-05-24 Digi International Inc. Spatially aware smart device provisioning
US9113320B2 (en) * 2012-06-15 2015-08-18 Tangome, Inc. Transferring an account between devices
US8498572B1 (en) * 2012-08-24 2013-07-30 Google Inc. Home automation device pairing by NFC-enabled portable device
US8620841B1 (en) * 2012-08-31 2013-12-31 Nest Labs, Inc. Dynamic distributed-sensor thermostat network for forecasting external events
US8539567B1 (en) * 2012-09-22 2013-09-17 Nest Labs, Inc. Multi-tiered authentication methods for facilitating communications amongst smart home devices and cloud-based servers
US9112844B2 (en) * 2012-12-06 2015-08-18 Audible, Inc. Device credentialing for network access
US8806209B2 (en) * 2012-12-22 2014-08-12 Wigwag, Llc Provisioning of electronic devices
US9125049B2 (en) * 2013-03-15 2015-09-01 Oplink Communications, Inc. Configuring secure wireless networks
US9332040B2 (en) 2013-10-07 2016-05-03 Google Inc. Hazard detection unit facilitating convenient setup of plural instances thereof in the smart home

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050253709A1 (en) * 2004-05-14 2005-11-17 Baker Paul J Hazardous condition detector with integral wireless connectivity infrastructure device
US20090077623A1 (en) * 2005-03-16 2009-03-19 Marc Baum Security Network Integrating Security System and Network Devices
CN102985915A (en) * 2010-05-10 2013-03-20 网际网路控制架构网络有限公司 Control system user interface
CN103221985A (en) * 2010-09-24 2013-07-24 Xped控股股份有限公司 Remote control and remote control systems
WO2012092627A1 (en) * 2010-12-31 2012-07-05 Nest Labs, Inc. Auto-configuring time-of-day for building control unit
US20130154823A1 (en) * 2011-12-20 2013-06-20 L&O Wireless, Inc. Alarm Detection and Notification System
CN102954564A (en) * 2012-11-23 2013-03-06 四川长虹电器股份有限公司 Control method for air conditioner

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106325245A (en) * 2016-08-18 2017-01-11 广州市迪士普音响科技有限公司 Control method and control system of wisdom platform
CN113835777A (en) * 2017-02-17 2021-12-24 谷歌有限责任公司 Mobile application activity detector
CN113835777B (en) * 2017-02-17 2024-02-02 谷歌有限责任公司 Mobile application activity detector
CN108966258A (en) * 2017-05-18 2018-12-07 霍尼韦尔国际公司 System and method for correcting the network connectivity of connection equipment
CN109168181A (en) * 2018-09-14 2019-01-08 珠海奔图电子有限公司 A kind of method and apparatus of the network connection of controlling terminal
CN111752443A (en) * 2019-03-28 2020-10-09 华为技术有限公司 Method, related device and system for controlling page by display equipment
CN111752443B (en) * 2019-03-28 2024-07-23 华为技术有限公司 Method, related device and system for controlling page of display equipment

Also Published As

Publication number Publication date
US20150100618A1 (en) 2015-04-09
US20160249395A1 (en) 2016-08-25
US20150097689A1 (en) 2015-04-09
CA2926459C (en) 2023-10-03
EP3055974A4 (en) 2017-05-31
US9596708B2 (en) 2017-03-14
CN105794170B (en) 2019-11-15
US9820315B2 (en) 2017-11-14
US9049567B2 (en) 2015-06-02
EP3447744A1 (en) 2019-02-27
WO2015054254A1 (en) 2015-04-16
US20150256563A1 (en) 2015-09-10
EP3055974B1 (en) 2018-10-03
EP3447744B1 (en) 2020-04-15
EP3055974A1 (en) 2016-08-17
US9332040B2 (en) 2016-05-03
US20170202039A1 (en) 2017-07-13
CA3130169A1 (en) 2015-04-16
CA2926459A1 (en) 2015-04-16
US10015825B2 (en) 2018-07-03

Similar Documents

Publication Publication Date Title
CN105794170B (en) For establishing wired home device and online management account matching method and system
US10540864B2 (en) Smart-home control system providing HVAC system dependent responses to hazard detection events
US10764735B2 (en) Methods and apparatus for using smart environment devices via application program interfaces
US9241270B1 (en) In-field smart device updates
US9760501B2 (en) In-field smart device updates
CN105706411B (en) High-efficiency network layer for IPv6 agreement
JP2019194867A (en) Remote alarm release with acoustic presence verification
CN114166351A (en) Home automation system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: American California

Applicant after: Google limited liability company

Address before: American California

Applicant before: Google Inc.

GR01 Patent grant
GR01 Patent grant